Zyxel security advisory for hardcoded credential vulnerability
Zyxel security advisory for hardcoded credential vulnerability
CVE: CVE-2020-29583
Summary
Zyxel has released a patch for the hardcoded credential vulnerability of firewalls and AP controllers recently reported by researchers from EYE Netherlands. Users are advised to install the applicable firmware updates for optimal protection.
What is the vulnerability?
A hardcoded credential vulnerability was identified in the “zyfwp” user account in some Zyxel firewalls and AP controllers. The account was designed to deliver automatic firmware updates to connected access points through FTP.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable products and are releasing firmware patches to address the issue, as shown in the table below. For optimal protection, we urge users to install the applicable updates. For those not listed, they are not affected. Contact your local Zyxel support team if you require further assistance or reference to this link on how to mitigate the risk.
Got a question or a tipoff?
Please contact your local service rep for further information or assistance. If you’ve found a vulnerability, we want to work with you to fix it—contact security@zyxel.com.tw and we’ll get right back to you.
Acknowledgment
Thanks to Niels Teusink at EYE for reporting the issue to us.
Revision history
2020-12-23: Initial release
2020-12-24: Updated the acknowledgement section
2021-1-4: Updated the patch schedule for AP controllers
Comments
-
Is the Zywall 110 affected? Autoupdate is not showing any available updates.
0 -
Is the Zywall 110 affected?
You can update the Zywall 110 to V4.60 patch 1
0 -
-
What should I do if I can’t upgrade the firmware in a short time?
1. If it is not absolutely necessary to manage devices from the WAN side, please disable the FTP/TELNET/SSH/WWW/SNMPv3 service from WAN. These services are disabled by default, so you won’t have to do so unless you have enabled it in the past.
2. If you still need to manage devices from the WAN side, please enable Policy Control and add rules to only allow access from trusted source IP addresses.
3. We also recommend users to enable Policy Control on the LAN side and add rules to only allow trusted IP addresses for better protection.
Zyxel_Dick
0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 144 Nebula Ideas
- 94 Nebula Status and Incidents
- 5.6K Security
- 237 USG FLEX H Series
- 267 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.3K Consumer Product
- 247 Service & License
- 384 News and Release
- 83 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.2K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 71 Security Highlight