Zyxel Product Line Security Update Advisory

Overview

An update has been released to address vulnerabilities in Zyxel Product Line. Users of the affected versions are advised to update to the latest version.

 

Affected Products

 

CVE-2024-7261

  • AP NWA50AX versions: ~ 7.00 (ABYW.1) (inclusive)
  • AP NWA50AX PRO versions: ~ 7.00 (ACGE.1) (inclusive)
  • AP NWA55AXE versions: ~ 7.00 (ABZL.1) (inclusive)
  • AP NWA90AX versions: ~ 7.00 (ACCV.1) (inclusive)
  • AP NWA90AX PRO versions: ~ 7.00 (ACGF.1) (inclusive)
  • AP NWA110AX versions: ~ 7.00 (ABTG.1) (inclusive)
  • AP NWA130BE versions: ~ 7.00 (ACIL.1) (inclusive)
  • AP NWA210AX versions: ~ 7.00 (ABTD.1) (inclusive)
  • AP NWA220AX-6E versions: ~ 7.00 (ACCO.1) (inclusive)
  • AP NWA1123-AC PRO versions: ~ 6.28 (ABHD.0) (inclusive)
  • AP NWA1123ACv3 versions: ~ 6.70 (ABVT.4) (inclusive)
  • AP WAC500 versions: ~ 6.70 (ABVS.4) (inclusive)
  • AP WAC500H versions: ~ 6.70 (ABWA.4) (inclusive)
  • AP WAC6103D-I versions: ~ 6.28 (AAXH.0) (inclusive)
  • AP WAC6502D-S versions: ~ 6.28 (AASE.0) (inclusive)
  • AP WAC6503D-S versions: ~ 6.28 (AASF.0) (inclusive)
  • AP WAC6552D-S versions: ~ 6.28 (ABIO.0) (inclusive)
  • AP WAC6553D-E versions: ~ 6.28 (AASG.2) (inclusive)
  • AP WAX300H versions: ~ 7.00 (ACHF.1) (inclusive)
  • AP WAX510D versions: ~ 7.00 (ABTF.1) (inclusive)
  • AP WAX610D versions: ~ 7.00 (ABTE.1) (inclusive)
  • AP WAX620D-6E versions: ~ 7.00 (ACCN.1) (inclusive)
  • AP WAX630S versions: ~ 7.00 (ABZD.1) (inclusive)
  • AP WAX640S-6E versions: ~ 7.00 (ACCM.1) (inclusive)
  • AP WAX650S versions: ~ 7.00 (ABRM.1) (inclusive)
  • AP WAX655E versions: ~ 7.00 (ACDO.1) (inclusive)
  • AP WBE530 versions: ~ 7.00 (ACLE.1) (inclusive)
  • AP WBE660S versions: ~ 7.00 (ACGG.1) (inclusive)
  • Security router USG LITE 60AX versions: V2.00 (ACIP.2)

 

CVE-2024-7203

  • ATP ZLD versions: 4.60 (inclusive) ~ 5.38 (inclusive)
  • USG FLEX ZLD versions: 4.60 (inclusive) ~ 5.38 (inclusive)

 

CVE-2024-42060, CVE-2024-42057, CVE-2024-42058

  • ATP ZLD versions: 4.32 (inclusive) ~ 5.38 (inclusive)
  • USG FLEX ZLD versions: 4.50 (inclusive) ~ 5.38 (inclusive)
  • USG FLEX 50(W)/USG20(W)-VPN ZLD versions: 4.16 (inclusive) ~ 5.38 (inclusive)

 

CVE-2024-42059

  • ATP ZLD versions: 5.00 (inclusive) ~ 5.38 (inclusive)
  • USG FLEX ZLD versions: 5.00 (inclusive) ~ 5.38 (inclusive)
  • USG FLEX 50(W)/USG20(W)-VPN ZLD versions: 5.00 (inclusive) ~ 5.38 (inclusive)

 

Resolved Vulnerabilities

 

Improperly sanitizing a special element of the parameter “host” in the CGI program in some versions of APs and secure routers could allow an unauthenticated attacker to execute OS commands by sending a crafted cookie to a vulnerable device (CVE-2024-7261)

command injection vulnerability that could allow an attacker to execute crafted CLI commands to execute some operating system (OS) commands on an affected device (CVE-2024-7203)

command injection vulnerability that could allow an attacker to execute some OS commands on an affected device by uploading a crafted internal user agreement file to the vulnerable device(CVE-2024-42060) 

command injection vulnerability that could allow an attacker to execute some OS commands on an affected device by sending a crafted username to a vulnerable device (CVE-2024-42057)

kernel pointer dereference vulnerability that could allow an attacker to cause a DoS condition by sending a crafted packet to a vulnerable device (CVE-2024-42058)

command injection vulnerability that could allow an attacker to execute some OS commands on an affected device by uploading a crafted, compressed language file via FTP (CVE-2024-42059)

Vulnerability Patches

 

The following product-specific Vulnerability Patches have been made available with the latest update. If you are using an affected version, Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
 

 

CVE-2024-7261

  • AP NWA50AX version: 7.00 (ABYW.2)
  • AP NWA50AX PRO version: 7.00 (ACGE.2)
  • AP NWA55AXE version: 7.00 (ABZL.2)
  • AP NWA90AX version: 7.00 (ACCV.2)
  • AP NWA90AX PRO version: 7.00 (ACGF.2)
  • AP NWA110AX version: 7.00 (ABTG.2)
  • AP NWA130BE version: 7.00 (ACIL.2)
  • AP NWA210AX version: 7.00 (ABTD.2)
  • AP NWA220AX-6E version: 7.00 (ACCO.2)
  • AP NWA1123-AC PRO version: 6.28 (ABHD.3)
  • AP NWA1123ACv3 version: 6.70 (ABVT.5)
  • AP WAC500 version: 6.70 (ABVS.5)
  • AP WAC500H version: 6.70 (ABWA.5)
  • AP WAC6103D-I version: 6.28 (AAXH.3)
  • AP WAC6502D-S version: 6.28 (AASE.3)
  • AP WAC6503D-S version: 6.28 (AASF.3)
  • AP WAC6552D-S version: 6.28 (ABIO.3)
  • AP WAC6553D-E version: 6.28 (AASG.3)
  • AP WAX300H version: 7.00 (ACHF.2)
  • AP WAX510D version: 7.00 (ABTF.2)
  • AP WAX610D version: 7.00 (ABTE.2)
  • AP WAX620D-6E version: 7.00 (ACCN.2)
  • AP WAX630S version: 7.00 (ABZD.2)
  • AP WAX640S-6E version: 7.00 (ACCM.2)
  • AP WAX650S version: 7.00 (ABRM.2)
  • AP WAX655E version: 7.00 (ACDO.2)
  • AP WBE530 version: 7.00 (ACLE.2)
  • AP WBE660S version: 7.00 (ACGG.2)
  • Security router USG LITE 60AX version: V2.00(ACIP.3)* (Updated by Cloud)

 

CVE-2024-7203

  • ATP ZLD version: 5.39
  • USG FLEX ZLD version: 5.39

 

CVE-2024-42060, CVE-2024-42057, CVE-2024-42058, CVE-2024-42059

  • ATP ZLD version: 5.39
  • USG FLEX ZLD version: 5.39
  • USG FLEX 50(W)/USG20(W)-VPN ZLD version: 5.39

     

References

[1] CVE-2024-7261 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-7261

[2] CVE-2024-7203 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-7203

[3] CVE-2024-42060 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-42060

[4] CVE-2024-42057 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-42057

[5] CVE-2024-42058 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-42058

[6] CVE-2024-42059 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-42059

[7] Zyxel security advisory for OS command injection vulnerability in APs and security router devices

https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024

[8] Zyxel security advisory for multiple vulnerabilities in firewalls

https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-09-03-2024