
Zyxel security advisory for local privilege escalation vulnerability of AP Configurator
Zyxel Employee
CVE: CVE-2022-0556
Summary
Zyxel has released a patch addressing a local privilege escalation vulnerability in its AP Configurator. Users are advised to install it for optimal protection.
What is the vulnerability?
A local privilege escalation vulnerability caused by incorrect permission assignment in some directories of the Zyxel AP Configurator (ZAC) could allow an attacker to execute arbitrary code in a specific directory on the local system.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve confirmed that only ZAC is affected and released a patch to address the issue, as shown in the table below.
|
Affected model |
Patch availability |
|
ZAC |
Got a question?
Please contact your local service rep or visit Zyxel’s forum for further information or assistance.
Acknowledgments
Thanks
to Trend Micro's Zero Day Initiative for
reporting the issue to us.
Revision history
2022-04-12: Initial release
Categories
- All Categories
- 442 Beta Program
- 2.9K Nebula
- 219 Nebula Ideas
- 127 Nebula Status and Incidents
- 6.5K Security
- 586 USG FLEX H Series
- 344 Security Ideas
- 1.7K Switch
- 84 Switch Ideas
- 1.4K Wireless
- 52 Wireless Ideas
- 7K Consumer Product
- 297 Service & License
- 476 News and Release
- 91 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.8K FAQ
- 34 Documents
- 87 About Community
- 102 Security Highlight