Networking device maker Zyxel is warning customers today of a new critical remote code execution (RCE) vulnerability impacting three models of its Networked Attached Storage (NAS) products.
The vulnerability is tracked as CVE-2022-34747 and has received a CVSS v3 severity score of 9.8, rated critical, but not many details have been disclosed.
“A format string vulnerability was found in a specific binary of Zyxel NAS products that could allow an attacker to achieve unauthorized remote code execution via a crafted UDP packet,” explains the advisory.
Security researcher Shaposhnikov Ilya discovered the vulnerability on June 2022. As a result, Zyxel gradually released security updates for the impacted models over the following months.
The NAS devices vulnerable to this flaw are NAS326, NAS540, and NAS542, all still within their active support period.
The vulnerable firmware versions are V5.21(AAZF.11)C0 and earlier for NAS326, V5.21(AATB.8)C0 and earlier for NAS540, and V5.21(AATB.8)C0 or older for NAS542.
The vendor has already released security updates for the impacted devices in the form of firmware updates, with links to the downloads in the security advisory.
Alternatively, you can visit Zyxel’s official download portal, enter your device model, and download the latest firmware update listed in the results.
Remote code execution flaws allow many different attacks, including bypassing the need for user authentication, elevation of privilege, or any other limiting prerequisite.
The vulnerability could be abused to steal data, delete data, or deploy ransomware on Internet-exposed NAS devices.
While all scenarios are dire, ransomware is the most common, as it gives the threat actors the best way to monetize a successful attack.
Only yesterday, we reported that QNAP patched a zero-day vulnerability over the weekend that was used in a new wave of DeadBolt ransomware attacks.
In February, the same group also targeted ASUSTOR devices by leveraging an exploit for a previously unknown flaw.
Thus, DeadBolt is competent enough to find undocumented security gaps, let alone exploit known vulnerabilities.
Other ransomware gangs actively targeting NAS devices are Checkmate and eChoraix, both very active in 2022.