Zyxel security advisory for post-authentication command injection vulnerability in NAS products
CVE: CVE-2023-27988
Summary
Zyxel has released patches addressing a post-authentication command injection vulnerability in some NAS versions. Users are advised to install them for optimal protection.
What is the vulnerability?
The post-authentication command injection vulnerability has been found in the web management interface of some NAS versions. An authenticated attacker with administrator privileges could leverage this vulnerability to execute some operating system (OS) commands on an affected device remotely.
What versions are vulnerable—and what should you do?
After a thorough investigation, we have identified the vulnerable products that are within their vulnerability support period, with their firmware patches shown in the table below.
Affected model | Affected version | Patch availability |
---|---|---|
NAS326 | V5.21(AAZF.12)C0 and earlier | |
NAS540 | V5.21(AATB.9)C0 and earlier | |
NAS542 | V5.21(ABAG.9)C0 and earlier |
Got a question?
Please contact your local service rep or visit Zyxel’s Community for further information or assistance.
Acknowledgment
Thanks to Noam Zhitomirsky, Reuven Yakar, Dean Zavadski, and Amit Serper from Sternum and Sternum LIV for reporting the issue to us.
Revision history
2023-5-30: Initial release
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 144 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.6K Security
- 237 USG FLEX H Series
- 267 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.3K Consumer Product
- 246 Service & License
- 383 News and Release
- 83 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.2K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight