Vulnerabilities in ZyXEL NAS products allow hackers to eas access vulnerable systems. Patch now

A team of researchers has revealed the finding of a couple of vulnerabilities in some network attached storage (NAS) products from ZyXEL, a China-based company that develops multiple network enterprise solutions. According to the report, successful exploiting of flaws would allow threat actors to bypass access controls to vulnerable systems with relatively ease.

Below are brief descriptions of reported vulnerabilities, in addition to their respective scores and identification keys according to the Common Vulnerability Scoring System (CVSS).

Esta imagen tiene un atributo ALT vacío; su nombre de archivo es zyxelnas.jpg

CVE-2020-13364: Inadequate access restrictions on a CGI script for web applications would allow threat actors to gain unauthorized access to restricted features. Malicious hackers could initiate Telnet or SSH services to generate a password for the “NsaRescueAngel” user account.

This is an average severity vulnerability that received a score of 7.1/10.

CVE-2020-13365: A series of inappropriate access restrictions in a CGI script for affected web applications would allow threat actors to initiate Telnet or SSH services to generate an account access password with root privileges to “NsaRescueAngel”, allowing threat actors to gain unauthorized access to restricted functionalities.     

Like the previous case, experts consider this to be an average severity failure, so it received a score of 7.1/10.

Both vulnerabilities reside in the following products:

  • Zyxel NAS 326
  • NAS520
  • NAS540
  • NAS542

While vulnerabilities can be exploited by unauthenticated remote threat actors, specialists have not detected attempts to exploit actively. ZyXEL has already released the required updates, so users of affected deployments will need to update as soon as possible. More details about vulnerabilities and their potential mitigation methods are available on the company’s official platforms.