Saturday, January 18, 2025
HomeCVE/vulnerabilityZyxel Format String Flaw Let Attackers Execute Unauthorized Remote Code

Zyxel Format String Flaw Let Attackers Execute Unauthorized Remote Code

Published on

SIEM as a Service

Follow Us on Google News

In a warning to its customers today, Zyxel has notified them of a vulnerability that poses a risk for RCE attacks. The issue affects three models of the company’s network-attached storage products.

The cybersecurity analysts at Zyxel have tracked the vulnerability as “CVE-2022-34747.” Through the use of a crafted UDP packet, a malicious attacker could be able to achieve RCE without the user’s knowledge.

On June 2022, this vulnerability was discovered by the security expert Shaposhnikov Ilya. Therefore, over the course of the next few months, Zyxel progressively released security updates for the affected models under the affected model number.

  • CVE ID: CVE-2022-34747
  • Description: It’s a format string vulnerability.
  • Base Score: 9.8
  • Severity: Critical
  • Source:: Zyxel Corporation

Affected Products

A series of Zyxel products are affected by this flaw, including:-

  • NAS326: V5.21(AAZF.11)C0 and earlier, (Patch: V5.21(AAZF.12)C0)
  • NAS540: V5.21(AATB.8)C0 and earlier, (Patch: V5.21(AATB.9)C0)
  • NAS542: V5.21(ABAG.8)C0 and earlier, (Patch: V5.21(ABAG.9)C0)

In recent years, hackers have become increasingly adept at hacking NAS devices. A hacker can steal your sensitive and personal information if you do not take precautions or keep your software up-to-date in order to protect yourself. 

Not only that, data can even be permanently deleted in some instances if they are extremely persistent and deploy ransomware as well. While the latest firmware update for Zyxel devices can be downloaded by visiting Zyxel’s official download portal.

There have been multiple vulnerabilities identified across multiple products by Zyxel and they have been addressed through security updates released in May 2022.

All of these scenarios are threatening, but ransomware is the most common and the most dangerous among them. It is clear that ransomware is the best method for threat actors to monetize their success if it is successfully exploited.

Secure Azure AD Conditional Access – Download Free White Paper

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which...

CISA Warns of Aviatrix Controllers OS Command Injection Vulnerability Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a...