Lucene search

K
hiveproHive ProHIVEPRO:89F3A84C54823D9991C0C0E01A8FEAC4
HistoryApr 02, 2022 - 12:44 a.m.

Authentication Bypass Vulnerability in Zyxel Firmware

2022-04-0200:44:28
Hive Pro
www.hivepro.com
39
zyxel
firmware
authentication bypass
vulnerability
cgi program
firewall
vpn products
administrator-level access
mitre att&ck
initial access
privilege escalation
firmware update

EPSS

0.058

Percentile

93.5%

THREAT LEVEL: Amber For a detailed advisory, download the pdf file here A severe vulnerability (CVE-2022-0342) has been discovered in the firmware of some of Zyxel's business-grade firewall and VPN products, potentially allowing attackers administrator-level access to affected devices. This vulnerability affects the USG/ZyWALL, USG FLEX, ATP, VPN, and NSG (Nebula Security Gateway) range of Zyxel products. This is an authentication bypass vulnerability (CVE-2022-0342) discovered in the CGI program of some firewall versions due to a lack of a proper access control mechanism. An attacker could use this flaw to circumvent authentication and get administrative access to the device. For optimal protection, we suggest organizations to update the firmware of their products according to the information given below. Potential MITRE ATT&CK TTPs are: TA0001: Initial Access TA0002: Execution TA0004: Privilege Escalation TA0005: Defense Evasion TA0006: Credential Access TA0007: Discovery TA0042: Resource Development T1040: Network Sniffing T1588: Obtain Capabilities T1588.006: Obtain Capabilities: Vulnerabilities T1548: Abuse Elevation Control Mechanism T1190: Exploit Public-Facing Application Vulnerability Details Affected Products Patch Links https://support.zyxel.eu/hc/en-us/articles/4672704562578-USG-FLEX-ATP-Series-Firmware-Update-5-21-Patch-1-Installation-Notes References https://www.zyxel.com/support/Zyxel-security-advisory-for-authentication-bypass-vulnerability-of-firewalls.shtml

EPSS

0.058

Percentile

93.5%

Related for HIVEPRO:89F3A84C54823D9991C0C0E01A8FEAC4