A Vulnerability in Zyxel Firewall Could Allow for Authentication Bypass

ITS Advisory Number: 
2022-043
Date(s) Issued: 
Monday, April 4, 2022
Subject: 
A Vulnerability in Zyxel Firewall Could Allow for Authentication Bypass
Overview: 

A vulnerability has been discovered in versions of Zyxel Firewall's CGI program which could allow for authentication bypass. Zyxel Firewall is a next generation firewall product which enables users to manage, detect and respond to threats on the network. Successful exploitation of this vulnerability could allow an attacker to bypass authentication and obtain administrative access to the device. Malicious actors with administrative access may be able to view, change, or delete sensitive data.

THREAT INTELLIGENCE:

There is currently no reports of this vulnerability being publicly exploited.

 

Systems Affected: 
  •  USG/ZyWALL - ZLD V4.20 through ZLD V4.70

  • USG FLEX - ZLD V4.50 through ZLD V5.20

  • ATP - ZLD V4.32 through ZLD V5.20

  • VPN - ZLD V4.30 through ZLD V5.20

  • NSG V1.20 through V1.33 Patch 4

RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
Low
Description: 

A vulnerability has been discovered in versions of Zyxel Firewall's CGI program which could allow for authentication bypass. Zyxel Firewall is a next generation firewall product which enables users to manage, detect and respond to threats on the network. Successful exploitation of this vulnerability could allow an attacker to bypass authentication and obtain administrative access to the device. Malicious actors with administrative access may be able to view, change, or delete sensitive data.

 

Actions: 

We recommend the following actions be taken:

  • Apply updates provided by Zyxel to vulnerable systems immediately after appropriate testing. 
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources. 
  • Apply the Principle of Least Privilege to all systems and services.