Improper Authentication (CWE-287)
An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware, USG FLEX series firmware, ATP series firmware, VPN series firmware, and NSG series firmware. This vulnerability could allow an attacker to bypass the web authentication and obtain administrative access of the device.
This vulnerability allows an attacker to bypass web authentication and gain administrative access to the affected Zyxel devices. With administrative access, an attacker could potentially modify device configurations, intercept or manipulate network traffic, create backdoors, or use the compromised device as a foothold for further network intrusion. The impact is severe as it affects the confidentiality, integrity, and availability of the device and potentially the entire network it protects.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Zyxel has released updated firmware versions to address this vulnerability. Users should update to the latest firmware version for their specific device model.
1. Update firmware immediately to the latest version provided by Zyxel for the specific device model. 2. If immediate patching is not possible, consider temporarily disabling web administration access or restricting it to trusted IP addresses only. 3. Monitor logs for any suspicious authentication attempts or unexpected administrative actions. 4. Implement network segmentation to limit potential impact if a device is compromised. 5. Regularly review and audit device configurations and access logs. 6. Implement strong, unique passwords for all administrative accounts. 7. Use multi-factor authentication for administrative access if supported by the device.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Feedly found the first article mentioning CVE-2022-0342. See article
EPSS Score was set to: 0.19% (Percentile: 56%)
A CVSS base score of 9.8 has been assigned.
CVE-2022-0342 is a critical vulnerability related to authentication bypass in Zyxel USG/Zywall devices, as indicated by the ET WEB_SPECIFIC_APPS rule. The details regarding its exploitation in the wild, CVSS score, proof-of-concept exploits, mitigations, detections, patches, or downstream impacts on third-party vendors are not provided in the given information. Further investigation is necessary to assess the full scope and implications of this vulnerability. See article