Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency on
Monday added[1]
two security flaws, including the recently disclosed remote code
execution bug affecting Zyxel firewalls, to its Known Exploited Vulnerabilities
Catalog
[2], citing evidence of
active exploitation.

Tracked as CVE-2022-30525[3], the vulnerability is
rated 9.8 for severity and relates to a command injection flaw in
select versions of the Zyxel firewall that could enable an
unauthenticated adversary to execute arbitrary commands on the
underlying operating system.

Impacted devices include –

  • USG FLEX 100, 100W, 200, 500, 700
  • USG20-VPN, USG20W-VPN
  • ATP 100, 200, 500, 700, 800, and
  • VPN series

The issue, for which patches were released by the Taiwanese firm
in late April (ZLD V5.30), became public knowledge on May 12
following a coordinated disclosure process with Rapid7.

Merely a day later, the Shadowserver Foundation said[4]
it began detecting exploitation attempts, with most of the
vulnerable appliances located in France, Italy, the U.S.,
Switzerland, and Russia.

CyberSecurity

Also added by CISA to the catalog is CVE-2022-22947[5], another code injection
vulnerability in Spring Cloud Gateway that could be exploited to
allow arbitrary remote execution on a remote host by means of a
specially crafted request.

The vulnerability is rated 10 out of 10 on the CVSS
vulnerability scoring system and has since been addressed[6]
in Spring Cloud Gateway versions 3.1.1 or later and 3.0.7 or later
as of March 2022.

References

  1. ^
    added
    (www.cisa.gov)
  2. ^
    Known
    Exploited Vulnerabilities Catalog

    (www.cisa.gov)
  3. ^
    CVE-2022-30525
    (thehackernews.com)
  4. ^
    said
    (twitter.com)
  5. ^
    CVE-2022-22947
    (nvd.nist.gov)
  6. ^
    addressed
    (tanzu.vmware.com)

Read more

Leave a Reply