Summary
Zyxel has released updates for a command injection vulnerability recently reported by Chaitin Security Research Lab. Users are advised to install the updates for optimal protection.
What is the vulnerability?
A command injection vulnerability was identified in the “chg_exp_pwd” CGI program on some Zyxel security firewalls. The lack of input string sanitization in the CGI program could allow an attacker to inject commands if they successfully log in as the admin and attempt to change the password using the vulnerable CGI.
What products are vulnerable—and what should you do?
After a thorough investigation of our product lines, we’ve identified the vulnerable products that are within their warranty and support period and released patches to address the issue, as shown in the table below. For optimal protection, we urge users to install the applicable updates.
Affected series | Patch available in |
VPN series | - On-premise: ZLD V4.39 week38* and above- Orchestrator: SD-OS V10.03 week32* and above |
USG series | ZLD V4.39 week38* and above |
USG FLEX series | ZLD V4.55 week38* and above |
ATP series | ZLD V4.55 week38* and above |
NSG series | V1.33 patch 4** and above |
*Please reach out to your local Zyxel support team for the file.
**Firmware update available on Nebula Control Center (NCC) at https://nebula.zyxel.com/.