Zyxel security advisory for OS command injection vulnerabilities of GS1900, XGS1210, and XGS1250 series switches

CVE: CVE-2021-35031, CVE-2021-35032

 

Summary

Zyxel has released patches addressing OS command injection vulnerabilities in the GS1900, XGS1210, and XGS1250 series of switches. Users are advised to install the applicable firmware updates for optimal protection.

What are the vulnerabilities?

CVE-2021-35031

An OS command injection vulnerability was identified in the TFTP client of Zyxel’s GS1900, XGS1210, and XGS1250 series of switches, such that an authenticated local user could execute arbitrary OS commands via the GUI of the vulnerable device.

CVE-2021-35032

An OS command injection vulnerability was identified in the libsal.so of Zyxel’s GS1900 series switches, such that an authenticated local user could execute OS commands via internal function calls.

What versions are vulnerable—and what should you do?

After a thorough investigation, we’ve identified the vulnerable switches for CVE-2021-35031 and CVE-2021-35032 that are within their warranty and support period, with their firmware patches shown in the table below.

CVE-2021-35031

CVE-2021-35032

GS1900-8

available on request

GS1900-8HP

available on request

GS1900-10HP

available on request

GS1900-16

available on request

GS1900-24E

available on request

GS1900-24EP

available on request

GS1900-24

available on request

GS1900-24HP

available on request

GS1900-24HPv2 

available on request

GS1900-48 

available on request

GS1900-48HP

available on request

GS1900-48HPv2

available on request

CVE-2021-35031

XGS1210-12

V1.00(ABTY.5)C0 in Dec. 2021

CVE-2021-35031

XGS1250-12

V1.00(ABWE.1)C0 in Dec. 2021

 

Got a question?

Please contact your local service rep or visit Zyxel’s forum for further information or assistance.

Acknowledgment

Thanks to Jasper Lievisse Adriaanse for reporting the issue to us.

Articles in this section

Was this article helpful?
0 out of 2 found this helpful
Share