Vulnerabilities

Zyxel Format String Flaw Let Attackers Execute Unauthorized Remote Code

In a warning to its customers today, Zyxel has notified them of a vulnerability that poses a risk for RCE attacks. The issue affects three models of the company’s network-attached storage products.

The cybersecurity analysts at Zyxel have tracked the vulnerability as “CVE-2022-34747.” Through the use of a crafted UDP packet, a malicious attacker could be able to achieve RCE without the user’s knowledge.

On June 2022, this vulnerability was discovered by the security expert Shaposhnikov Ilya. Therefore, over the course of the next few months, Zyxel progressively released security updates for the affected models under the affected model number.

  • CVE ID: CVE-2022-34747
  • Description: It’s a format string vulnerability.
  • Base Score: 9.8
  • Severity: Critical
  • Source:: Zyxel Corporation

Affected Products

A series of Zyxel products are affected by this flaw, including:-

  • NAS326: V5.21(AAZF.11)C0 and earlier, (Patch: V5.21(AAZF.12)C0)
  • NAS540: V5.21(AATB.8)C0 and earlier, (Patch: V5.21(AATB.9)C0)
  • NAS542: V5.21(ABAG.8)C0 and earlier, (Patch: V5.21(ABAG.9)C0)

In recent years, hackers have become increasingly adept at hacking NAS devices. A hacker can steal your sensitive and personal information if you do not take precautions or keep your software up-to-date in order to protect yourself. 

Not only that, data can even be permanently deleted in some instances if they are extremely persistent and deploy ransomware as well. While the latest firmware update for Zyxel devices can be downloaded by visiting Zyxel’s official download portal.

There have been multiple vulnerabilities identified across multiple products by Zyxel and they have been addressed through security updates released in May 2022.

To Top

Pin It on Pinterest

Share This