Unauthenticated Command Injection Vulnerability in Zyxel NAS326 Firmware
CVE-2024-29973

9.8CRITICAL

Key Information:

Vendor
Zyxel
Vendor
CVE Published:
4 June 2024

Badges

📈 Score: 110💰 Ransomware👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2024-29973?

CVE-2024-29973 is a serious vulnerability affecting Zyxel NAS326 firmware and NAS542 firmware. These devices are Network Attached Storage (NAS) solutions designed for home and small business use, allowing users to store and manage data across a network. The vulnerability enables an unauthenticated attacker to inject arbitrary commands via crafted HTTP POST requests, potentially allowing them to execute operating system commands on the device. This could lead to unauthorized access and control over the NAS, posing significant risks to data integrity and network security for organizations utilizing these systems.

Technical Details

The vulnerability specifically resides in the "setCookie" parameter of the Zyxel NAS326 and NAS542 firmware. Versions prior to V5.21(AAZF.17)C0 for NAS326 and V5.21(ABAG.14)C0 for NAS542 are affected. Attackers can exploit this vulnerability without authentication, making it particularly dangerous as it lowers the barrier to entry for potential malicious actors. The execution of operating system commands could allow attackers to manipulate data, install malware, or disrupt services on the affected devices.

Potential impact of CVE-2024-29973

  1. Unauthorized Access and Control: The vulnerability allows unauthenticated attackers to execute commands on the devices, potentially giving them full control over the NAS systems. This access could lead to the unauthorized modification or deletion of sensitive data.

  2. Data Breaches: Given the nature of NAS devices, containing valuable data, exploitation could result in data breaches, exposing personal or proprietary information which could be detrimental to an organization’s reputation and compliance with data protection regulations.

  3. Malware Installation and Network Compromise: If exploited, attackers could deploy malware or ransomware, not only affecting the target NAS but potentially spreading across the network to other connected devices, escalating the severity of the compromise and impacting overall organizational security.

Affected Version(s)

NAS326 firmware < V5.21(AAZF.17)C0

NAS542 firmware < V5.21(ABAG.14)C0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Critical Zyxel NAS vulnerability targeted by Mirai-like botnet

Hackread reports that outdated Zyxel network-attached storage devices are being subjected to intrusions by a Mirai-like botnet exploiting the critical Python code injection flaw, tracked as CVE-2024-29973.

7 months ago

ロシア関連グループ、最新の影響力行使キャンペーンでバイデン批判しトランプを称賛 | Codebook|Security News

ロシア関連グループが最新の影響力行使キャンペーンでバイデン大統領を批判し、トランプ前大統領を称賛|「Miraiのような」ボットネットによるEOL Zyxel NASデバイスへの攻撃が確認される(CVE-2024-29973)

7 months ago

Recent Zyxel NAS Vulnerability Exploited by Botnet

A Mirai-like botnet has started exploiting a critical-severity vulnerability in discontinued Zyxel NAS products.

7 months ago

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 💰

    Used in Ransomware

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by GBHackers on Security

  • Vulnerability published

  • Vulnerability Reserved

.