CVE-2024-42060

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)

Published: Sep 3, 2024 / Updated: 2mo ago

010
CVSS 7.2EPSS 0.05%High
CVE info copied to clipboard

Summary

A post-authentication command injection vulnerability in Zyxel ATP series, USG FLEX series, USG FLEX 50(W) series, and USG20(W)-VPN series firmware could allow an authenticated attacker with administrator privileges to execute some OS commands on an affected device. This is achieved by uploading a crafted internal user agreement file to the vulnerable device.

Impact

This vulnerability allows an attacker with administrator privileges to execute arbitrary OS commands on the affected Zyxel devices. This could lead to complete compromise of the device, potentially allowing the attacker to modify system configurations, access sensitive information, or use the device as a pivot point for further network attacks. The impact is severe, as it affects the confidentiality, integrity, and availability of the device, all rated as "HIGH" in the CVSS score.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Zyxel has released security updates to address this vulnerability. The patch information was added on September 5, 2024, and can be found on the Zyxel website (www.zyxel.com) in their security advisory for multiple vulnerabilities in firewalls.

Mitigation

1. Update the firmware immediately to versions newer than those listed as vulnerable. 2. Implement strong access controls to limit administrator access to only necessary personnel. 3. Monitor and audit administrator activities, especially file uploads. 4. If immediate patching is not possible, consider temporarily disabling the ability to upload internal user agreement files if this feature is not critical to operations. 5. Implement network segmentation to limit the potential impact if a device is compromised. 6. Regularly review and update administrator credentials.

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-42060

Sep 3, 2024 at 2:15 AM
First Article

Feedly found the first article mentioning CVE-2024-42060. See article

Sep 3, 2024 at 2:16 AM / Zyxel
Threat Intelligence Report

CVE-2024-42060 is a critical post-authentication command injection vulnerability in Zyxel firewalls that allows an authenticated attacker to execute OS commands. It is not known if this vulnerability is being exploited in the wild, but patches have been released by Zyxel to address the issue. It is important for organizations using affected firewall versions to apply the patches immediately to prevent potential exploitation and downstream impacts on their network security. See article

Sep 3, 2024 at 2:16 AM
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 3, 2024 at 2:21 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 21.1%)

Sep 3, 2024 at 9:38 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (206735)

Sep 6, 2024 at 9:18 PM
Static CVE Timeline Graph

Affected Systems

Zyxel/zld_firmware
+null more

Patches

www.zyxel.com
+null more

Attack Patterns

CAPEC-108: Command Line Execution through SQL Injection
+null more

References

Zyxel security advisory for multiple vulnerabilities in firewalls
CVE-2024-42060 A post-authentication command injection vulnerability in some firewall versions could allow an authenticated attacker with administrator privileges to execute some OS commands on an affected device by uploading a crafted internal user agreement file to the vulnerable device. CVE-2024-42059 A post-authentication command injection vulnerability in some firewall versions could allow an authenticated attacker with administrator privileges to execute some OS commands on an affected device by uploading a crafted compressed language file via FTP.

News

Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers
CVE-2024-6343 (CVSS score: 4.9) – A buffer overflow vulnerability that could allow an authenticated attacker with administrator privileges to trigger DoS conditions by means of a specially crafted HTTP request CVE-2024-5412 (CVSS score: 7.5) – A buffer overflow vulnerability in the “libclinkc” library that could allow an unauthenticated attacker to cause DoS conditions by means of a specially crafted HTTP request
Zyxel firewalls with highly dangerous security vulnerabilities
A post-authentication command prompt vulnerability in some firewall versions could allow an authenticated attacker with administrative privileges to execute certain operating system commands on an affected device by uploading a crafted internal user agreement file to the vulnerable device. A vulnerability in some firewall versions that allows command entry after authentication could allow an authenticated attacker with administrative privileges to execute certain operating system commands on an affected device by uploading a crafted compressed language file via FTP.
Zyxel firewalls with highly dangerous security vulnerabilities
A post-authentication command prompt vulnerability in some firewall versions could allow an authenticated attacker with administrative privileges to execute certain operating system commands on an affected device by uploading a crafted internal user agreement file to the vulnerable device. A vulnerability in some firewall versions that allows command entry after authentication could allow an authenticated attacker with administrative privileges to execute certain operating system commands on an affected device by uploading a crafted compressed language file via FTP.
Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers
CVE-2024-6343 (CVSS score: 4.9) – A buffer overflow vulnerability that could allow an authenticated attacker with administrator privileges to trigger DoS conditions by means of a specially crafted HTTP request CVE-2024-5412 (CVSS score: 7.5) – A buffer overflow vulnerability in the “libclinkc” library that could allow an unauthenticated attacker to cause DoS conditions by means of a specially crafted HTTP request
Zyxel USG FLEX 4.16 < 5.39 Multiple Vulnerabilities
Nessus Plugin ID 206737 with High Severity Synopsis The remote security gateway is affected by multiple vulnerabilities. Description The Firmware version of the Zyxel USG FLEX device is affected by multiple vulnerabilities: - A command injection vulnerability in the IPSec VPN feature of Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an unauthenticated attacker to execute some OS commands on an affected device by sending a crafted username to the vulnerable device. Note that this attack could be successful only if the device was configured in User-Based-PSK authentication mode and a valid user with a long username exceeding 28 characters exists. (CVE-2024-42057) - A buffer overflow vulnerability in the CGI program of Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an authenticated attacker with administrator privileges to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device. (CVE-2024-6343) - A post-authentication command injection vulnerability in some firewall versions could allow an authenticated attacker with administrator privileges to execute some OS commands on an affected device by uploading a crafted internal user agreement file to the vulnerable device. (CVE-2024-42060) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Upgrade to Zyxel USG FLEX to version 5.39 or later. Read more at https://www.tenable.com/plugins/nessus/206737
See 32 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI