Zyxel security advisory for format string vulnerability in NAS
Zyxel Employee
CVE: CVE-2022-34747
Summary
Zyxel has released patches for NAS products affected by a format string vulnerability. Users are advised to install them for optimal protection.
What is the vulnerability?
A format string vulnerability was found in a
specific binary of Zyxel NAS products that could allow an attacker to achieve unauthorized remote code execution via a crafted UDP packet.
What versions are vulnerable-and what should you do?
After a thorough investigation, we have identified the vulnerable products that are within their vulnerability support period, with their firmware patches shown in the table below.
|
Affected model |
Affected version |
Patch availability |
|
NAS326 |
V5.21(AAZF.11)C0 and earlier |
|
|
NAS540 |
V5.21(AATB.8)C0 and earlier |
|
|
NAS542 |
V5.21(ABAG.8)C0 and earlier |
Got a question?
Please contact your local service rep or visit Zyxel’s forum for further information or assistance.
Acknowledgment
Thanks to Shaposhnikov Ilya for reporting the issue to us.
Revision history
2022-09-06: Initial release.
Categories
- All Categories
- 442 Beta Program
- 3K Nebula
- 223 Nebula Ideas
- 129 Nebula Status and Incidents
- 6.6K Security
- 628 USG FLEX H Series
- 353 Security Ideas
- 1.8K Switch
- 85 Switch Ideas
- 1.4K Wireless
- 54 Wireless Ideas
- 7K Consumer Product
- 299 Service & License
- 492 News and Release
- 92 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.8K FAQ
- 34 Documents
- 88 About Community
- 108 Security Highlight