News

Researchers discovered vulnerabilities in Zyxel devices

Researchers at SEC Consult have identified a number of vulnerabilities in various devices of the major network equipment manufacturer Zyxel. Vulnerabilities related to sending unauthenticated DNS queries and embedded FTP credentials.

The first vulnerability affects USG, UAG, ATP, VPN and NXC series network security devices and is associated with information disclosure through unauthenticated DNS queries.

Exploitation of the vulnerability allows an unauthorized user to check for a domain through a web-based interface.

“Using a DNS query, an unauthorized attacker can send a lot of queries from a fake source to a third-party DNS service or check for domain names on an internal network protected by a firewall”, – noted the researchers.

Researchers also found the presence of embedded FTP credentials at several NWA, NAP, and WAC Wi-Fi access points.

Read also: Foxit Software Alerts Users About Compromise

Using this data, the attacker can log in to the FTP server and obtain a configuration file containing the SSID and passwords that allow access to secure networks.

“The FTP service runs on the Zyxel Wireless Access Point, which contains the configuration file for the Wi-Fi network. This FTP server can be accessed using the credentials built into the firmware of the access point. When connecting to a Wi-Fi network to another VLAN, an attacker can move across the network by stealing credentials from an FTP server”, – the researchers noted.

In late August, Zyxel released firmware updates that address vulnerabilities, as well as temporary patches for some devices. For them, updates will be available in few months.

SEC Consult recommends Zyxel customers to upgrade the firmware to the latest version available. A security review should be installed immediately though security professionals perform installation to identify further potential security issues should.

William Reddy

I am from Ireland. My parents bought me a computer when I was 11, and several month after I have got a virus on this PC. I decided to enter the INSA Centre Val de Loire university after being graduated from the school. This French educational institution was offering a brand-new cybersecurity course. After getting the master degree in cybersecurity, I've started working in as virus analyst in a little anti-malware vendor. In 2018, I've decided to start Virus Removal project. The main target of this site is to help people to deal with PC viruses of any kind.

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

Back to top button