Zyxel security advisory for post-authentication command injection vulnerability in NAS products
CVE: CVE-2023-5372
Summary
Zyxel has released patches addressing a post-authentication command injection vulnerability in some NAS versions. Users are advised to install them for optimal protection.
What is the vulnerability?
The post-authentication command injection vulnerability in some Zyxel NAS devices could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands by sending a crafted query parameter attached to the URL of an affected device’s web management interface.
What versions are vulnerable—and what should you do?
After a thorough investigation, we have identified the products affected* at the time of the issue report and provided the firmware patches outlined in the table below.
Affected model | Affected version | Patch availability |
---|---|---|
NAS326 | V5.21(AAZF.15)C0 and earlier | |
NAS542 | V5.21(ABAG.12)C0 and earlier |
*Note that both the vulnerable models reached end-of-vulnerability-support on Dec. 31, 2023.
Got a question?
Please contact your local service rep or visit Zyxel’s community for further information or assistance.
Acknowledgment
Thanks to Gábor Selján from BugProve for reporting the issue to us.
Revision history
2024-1-30: Initial release.
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 144 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.6K Security
- 237 USG FLEX H Series
- 267 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.3K Consumer Product
- 246 Service & License
- 383 News and Release
- 83 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.2K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight