#VU63562 OS Command Injection in ZyXEL Communications Corp. products - CVE-2022-26532

 

#VU63562 OS Command Injection in ZyXEL Communications Corp. products - CVE-2022-26532

Published: May 24, 2022


Vulnerability identifier: #VU63562
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-26532
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
USG series
USG FLEX series
VPN series
ZyWALL
ATP series
NSG series
NXC2500
NXC5500
NAP203
NAP303
NAP353
NWA50AX
NWA55AXE
NWA90AX
NWA1123-AC-HD
NWA1123-AC-PRO
NWA5123-AC-HD
WAX630S
NWA110AX
NWA210AX
NWA1123ACv3
NWA1302-AC
WAC500H
WAC500
WAC5302D-S
WAC5302D-Sv2
WAC6103D-I
WAC6303D-S
WAC6502D-E
WAC6502D-S
WAC6503D-S
WAC6553D-E
WAC6552D-S
WAX510D
WAX610D
WAX650S
Software vendor:
ZyXEL Communications Corp.

Description

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the "packet-trace" CLI command. A local user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links