CVE: CVE-2021-35031, CVE-2021-35032
Summary
Zyxel has released patches addressing OS command injection vulnerabilities in the GS1900, XGS1210, and XGS1250 series of switches. Users are advised to install the applicable firmware updates for optimal protection.
What are the vulnerabilities?
CVE-2021-35031
An OS command injection vulnerability was identified in the TFTP client of Zyxel’s GS1900, XGS1210, and XGS1250 series of switches, such that an authenticated local user could execute arbitrary OS commands via the GUI of the vulnerable device.
CVE-2021-35032
An OS command injection vulnerability was identified in the libsal.so of Zyxel’s GS1900 series switches, such that an authenticated local user could execute OS commands via internal function calls.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable switches for CVE-2021-35031 and CVE-2021-35032 that are within their warranty and support period, with their firmware patches shown in the table below.
CVE-2021-35031 CVE-2021-35032 |
GS1900-8 |
available on request |
GS1900-8HP |
available on request |
|
GS1900-10HP |
available on request |
|
GS1900-16 |
available on request |
|
GS1900-24E |
available on request |
|
GS1900-24EP |
available on request |
|
GS1900-24 |
available on request |
|
GS1900-24HP |
available on request |
|
GS1900-24HPv2 |
available on request |
|
GS1900-48 |
available on request |
|
GS1900-48HP |
available on request |
|
GS1900-48HPv2 |
available on request |
|
CVE-2021-35031 |
XGS1210-12 |
V1.00(ABTY.5)C0 in Dec. 2021 |
CVE-2021-35031 |
XGS1250-12 |
V1.00(ABWE.1)C0 in Dec. 2021 |
Got a question?
Please contact your local service rep or visit Zyxel’s forum for further information or assistance.
Acknowledgment
Thanks to Jasper Lievisse Adriaanse for reporting the issue to us.
Comments
0 comments
Please sign in to leave a comment.