Friday, October 4, 2024
HomeCVE/vulnerabilityZyxel Format String Flaw Let Attackers Execute Unauthorized Remote Code

Zyxel Format String Flaw Let Attackers Execute Unauthorized Remote Code

Published on

In a warning to its customers today, Zyxel has notified them of a vulnerability that poses a risk for RCE attacks. The issue affects three models of the company’s network-attached storage products.

The cybersecurity analysts at Zyxel have tracked the vulnerability as “CVE-2022-34747.” Through the use of a crafted UDP packet, a malicious attacker could be able to achieve RCE without the user’s knowledge.

On June 2022, this vulnerability was discovered by the security expert Shaposhnikov Ilya. Therefore, over the course of the next few months, Zyxel progressively released security updates for the affected models under the affected model number.

- Advertisement - EHA
  • CVE ID: CVE-2022-34747
  • Description: It’s a format string vulnerability.
  • Base Score: 9.8
  • Severity: Critical
  • Source:: Zyxel Corporation

Affected Products

A series of Zyxel products are affected by this flaw, including:-

  • NAS326: V5.21(AAZF.11)C0 and earlier, (Patch: V5.21(AAZF.12)C0)
  • NAS540: V5.21(AATB.8)C0 and earlier, (Patch: V5.21(AATB.9)C0)
  • NAS542: V5.21(ABAG.8)C0 and earlier, (Patch: V5.21(ABAG.9)C0)

In recent years, hackers have become increasingly adept at hacking NAS devices. A hacker can steal your sensitive and personal information if you do not take precautions or keep your software up-to-date in order to protect yourself. 

Not only that, data can even be permanently deleted in some instances if they are extremely persistent and deploy ransomware as well. While the latest firmware update for Zyxel devices can be downloaded by visiting Zyxel’s official download portal.

There have been multiple vulnerabilities identified across multiple products by Zyxel and they have been addressed through security updates released in May 2022.

All of these scenarios are threatening, but ransomware is the most common and the most dangerous among them. It is clear that ransomware is the best method for threat actors to monetize their success if it is successfully exploited.

Secure Azure AD Conditional Access – Download Free White Paper

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group

Microsoft and the U.S. Department of Justice (DOJ) have successfully dismantled a network of...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system...

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed "perfctl," actively targeting millions of Linux...

Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals

Doppler, the leading platform in secrets management, today announces the launch of Change Requests,...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new...

CISA Warns of Four Vulnerabilities that Exploited Actively in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has warned about four critical vulnerabilities currently...

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the...