Zyxel security advisory for directory traversal and command injection vulnerabilities of VPN2S





CVE: CVE-2021-35027, CVE-2021-35028
Summary
Zyxel has released a patch addressing directory traversal and command injection vulnerabilities in the VPN2S firewall. Users are advised to install it for optimal protection.
What is the vulnerability?
A directory traversal vulnerability caused by specific character sequences within an improperly sanitized URL was identified in the VPN2S firewall. A command injection vulnerability caused by improper filtering for the parameters in a CGI program was also identified.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified one vulnerable product that is within its warranty and support period and released a hotfix to address the issue, as shown in the table below.
Affected model | Hotfix availability |
ZyWALL VPN2S |
Got a question or a tipoff?
Please contact your local service rep or comment below for further information or assistance.
Acknowledgment
Thanks to Qihoo 360 for reporting the issues to us.
Revision history
2021-09-30: Initial release
Categories
- 8.1K All Categories
- 1.6K Nebula
- 60 Nebula Ideas
- 54 Nebula Status and Incidents
- 4.4K Security
- 224 Security Ideas
- 963 Switch
- 45 Switch Ideas
- 867 WirelessLAN
- 20 WLAN Ideas
- 5.2K Consumer Product
- 139 Service & License
- 268 News and Release
- 53 Security Advisories
- 12 Education Center
- 573 FAQ
- 273 Nebula FAQ
- 132 Security FAQ
- 73 Switch FAQ
- 72 WirelessLAN FAQ
- 7 Consumer Product FAQ
- Documents
- 34 Nebula Monthly Express
- 71 About Community
- 44 Security Highlight