10
CVE-2020-9054
- EPSS 94.31%
- Published 04.03.2020 20:15:10
- Last modified 21.03.2025 19:50:32
- Source cret@cert.org
- Teams watchlist Login
- Open Login
Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2
Data is provided by the National Vulnerability Database (NVD)
Zyxel ≫ Nas326 Firmware Version < 5.21\(aazf.7\)c0
Zyxel ≫ Nas520 Firmware Version < 5.21\(aasz.3\)c0
Zyxel ≫ Nas540 Firmware Version < 5.21\(aatb.4\)c0
Zyxel ≫ Nas542 Firmware Version < 5.21\(abag.4\)c0
Zyxel ≫ Atp100 Firmware Version >= 4.35 < 4.35\(abps.3\)c0
Zyxel ≫ Atp200 Firmware Version >= 4.35 < 4.35\(abfw.3\)c0
Zyxel ≫ Atp500 Firmware Version >= 4.35 < 4.35\(abfu.3\)c0
Zyxel ≫ Atp800 Firmware Version >= 4.35 < 4.35\(abiq.3\)c0
Zyxel ≫ Usg20-vpn Firmware Version >= 4.35 < 4.35\(abaq.3\)c0
Zyxel ≫ Usg20w-vpn Firmware Version >= 4.35 < 4.35\(abar.3\)c0
Zyxel ≫ Usg40 Firmware Version >= 4.35 < 4.35\(aala.3\)c0
Zyxel ≫ Usg40w Firmware Version >= 4.35 < 4.35\(aalb.3\)c0
Zyxel ≫ Usg60 Firmware Version >= 4.35 < 4.35\(aaky.3\)c0
Zyxel ≫ Usg60w Firmware Version >= 4.35 < 4.35\(aakz.3\)c0
Zyxel ≫ Usg110 Firmware Version >= 4.35 < 4.35\(aaph.3\)c0
Zyxel ≫ Usg210 Firmware Version >= 4.35 < 4.35\(aapi.3\)c0
Zyxel ≫ Usg310 Firmware Version >= 4.35 < 4.35\(aapj.3\)c0
Zyxel ≫ Usg1100 Firmware Version >= 4.35 < 4.35\(aapk.3\)c0
Zyxel ≫ Usg1900 Firmware Version >= 4.35 < 4.35\(aapl.3\)c0
Zyxel ≫ Usg2200 Firmware Version >= 4.35 < 4.35\(abae.3\)c0
Zyxel ≫ Vpn50 Firmware Version >= 4.35 < 4.35\(abhl.3\)c0
Zyxel ≫ Vpn100 Firmware Version >= 4.35 < 4.35\(abfv.3\)c0
Zyxel ≫ Vpn300 Firmware Version >= 4.35 < 4.35\(abfc.3\)c0
Zyxel ≫ Vpn1000 Firmware Version >= 4.35 < 4.35\(abip.3\)c0
Zyxel ≫ Zywall110 Firmware Version >= 4.35 < 4.35\(aaaa.3\)c0
Zyxel ≫ Zywall310 Firmware Version >= 4.35 < 4.35\(aaab.3\)c0
Zyxel ≫ Zywall1100 Firmware Version >= 4.35 < 4.35\(aaac.3\)c0
25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Zyxel Multiple NAS Devices OS Command Injection Vulnerability
VulnerabilityMultiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code.
DescriptionApply updates per vendor instructions.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.31% | 0.999 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.