--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Remote Code Execution in Zyxel Products' version: '1.0' number: '2022-035' date: 'May 17, 2022' --- _History:_ * _17/05/2022 --- v1.0 -- Initial publication_ # Summary In April 2022, a security researcher from Rapid7 discovered and reported a vulnerability that affects Zyxel firewall and VPN devices for business (advisory publicly released on 12th May 2022). Tracked as CVE-2022-30525 with a CVSS score of 9.8, a successful exploitation of this vulnerability allows an **unauthenticated and remote** attacker to achieve **code execution** as the `nobody` user [1]. A public exploit is available and a module had been added to the Metasploit penetration testing framework. This vulnerability is currently exploited in the wild by attackers to get access to information systems [2]. It is **strongly** recommended to apply the vendor patch as soon as possible. # Technical Details The affected products are vulnerable to unauthenticated and remote command injection via the administrative HTTP interface. This vulnerability is exploited through the `/ztp/cgi-bin/handler` URI and is the result of passing unsanitized attacker input into the `os.system` method in `lib_wan_settings.py`. The vulnerable functionality is invoked in association with the `setWanPortSt` command. An attacker can inject arbitrary commands into the `mtu` or the `data` parameter [1]. # Affected Products The list of affected products is following [2]: | Affected Models | Impacted version | Fixed Version | |--------------------------------|---------------------------------|---------------| |USG FLEX 100, 100W, 200, 500, 700 | ZLD5.00 through ZLD5.21 Patch 1| ZLD V5.30 | |USG FLEX 50(W), USG20(W)-VPN | ZLD5.10 through ZLD5.21 Patch 1| ZLD V5.30 | |ATP series | ZLD5.10 through ZLD5.21 Patch 1| ZLD V5.30 | |VPN series | ZLD V4.60 through ZLD V5.21 Patch 1 | ZLD V5.30 | # Recommendations CERT-EU strongly recommends to apply the vendor patch as soon as possible. It can be done by enabling automatic firmware update. # References [1] [2]