#VU48620 Command Injection in ZyXEL ZLD and ZeXEL SD-OS - CVE-2020-29299

 

#VU48620 Command Injection in ZyXEL ZLD and ZeXEL SD-OS - CVE-2020-29299

Published: November 24, 2020 / Updated: December 29, 2020


Vulnerability identifier: #VU48620
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-29299
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
ZyXEL ZLD
ZeXEL SD-OS
Software vendor:
ZyXEL Communications Corp.

Description

The vulnerability allows a remote user to execute arbitrary commands on the system.

The vulnerability exists due to insufficient validation of user supplied input n the “chg_exp_pwd” CGI program on some Zyxel security firewalls. A remote authenticated user can inject and execute arbitrary OS commands with elevated privileges.


Remediation

Install updates from vendor's website.

Affected series Patch available in
VPN series
  • On-premise: ZLD V4.39 week38* and above
  • Orchestrator: SD-OS V10.03 week32* and above
USG series ZLD V4.39 week38* and above
USG FLEX series ZLD V4.55 week38* and above
ATP series ZLD V4.55 week38* and above
NSG series V1.33 patch 4** and above

External links