Article Details

Scrape Timestamp (UTC): 2024-06-05 07:18:00.617

Source: https://thehackernews.com/2024/06/zyxel-releases-patches-for-firmware.html

Original Article Text

Click to Toggle View

Zyxel Releases Patches for Firmware Vulnerabilities in EoL NAS Models. Zyxel has released security updates to address critical flaws impacting two of its network-attached storage (NAS) devices that have currently reached end-of-life (EoL) status. Successful exploitation of three of the five vulnerabilities could permit an unauthenticated attacker to execute operating system (OS) commands and arbitrary code on affected installations. Impacted models include NAS326 running versions V5.21(AAZF.16)C0 and earlier, and NAS542 running versions V5.21(ABAG.13)C0 and earlier. The shortcomings have been resolved in versions V5.21(AAZF.17)C0 and V5.21(ABAG.14)C0, respectively. A brief description of the flaws is as follows - Outpost24 security researcher Timothy Hjort has been credited with discovering and reporting the five flaws. It's worth noting that the two of the privilege escalation flaws that require authentication remain unpatched. While there is no evidence that the issues have been exploited in the wild, users are recommended to update to the latest version for optimal protection. Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.

Daily Brief Summary

MALWARE // Zyxel Addresses Critical Vulnerabilities in Outdated NAS Devices

Zyxel has issued updates for critical vulnerabilities in two of its end-of-life NAS models, NAS326 and NAS542.

The vulnerabilities affect firmware versions up to V5.21(AAZF.16)C0 for NAS326 and V5.21(ABAG.13)C0 for NAS542.

Updated firmware versions V5.21(AAZF.17)C0 and V5.21(ABAG.14)C0 have been released to patch these issues.

Three out of the five detected vulnerabilities could allow unauthenticated attackers to run OS commands and arbitrary code.

Security researcher Timothy Hjort from Outpost24 discovered and reported these flaws.

Two privilege escalation flaws requiring authentication remain unpatched.

No current evidence suggests these vulnerabilities have been exploited in the wild.

Users are strongly recommended to update their devices to the newly released firmware versions to ensure security.