About the Vulnerability

Introduction

Zyxel NAS is a network attached storage device developed by Zyxel Communications Corporation, specifically used for storing and sharing files. It connects to computers, servers, or other devices through a network to provide centralized file storage and access capabilities.

Summary

On June 6, 2024, Sangfor FarSight Labs received notification of the remote code execution vulnerability (CVE-2024-29974) in Zyxel NAS, classified as critical (CVSS Score 9.8) by NVD.

This vulnerability exists in the CGI program file_upload-cgi on Zyxel NAS326 earlier than V5.21(AAZF.17)C0 and NAS542 earlier than V5.21(ABAG.14)C0. Unauthenticated attackers can execute arbitrary code by uploading a malicious file, causing server compromise.

Affected Versions

Zyxel NAS326 < V5.21(AAZF.17)C0

Zyxel NAS542 < V5.21(ABAG.14)C0

Solutions

Remediation Solutions

Official Solution

Zyxel has released new versions of NAS, and affected users are strongly recommended to update to the following version to fix the vulnerability.

NAS326: V5.21(AAZF.17)C0

NAS542: V5.21(ABAG.14)C0

Download link: https://www.zyxel.com/global/en/support/download

Timeline

On June 6, 2024, Sangfor FarSight Labs received notification of the Zyxel NAS remote code execution vulnerability (CVE-2024-29974).

On June 6, 2024, Sangfor FarSight Labs released a vulnerability alert.

References

https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/ https://cxsecurity.com/cveshow/CVE-2024-29974/ https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

See Other Product