Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2020-9054 First vendor Publication 2020-03-04
Vendor Cve Last vendor Modification 2020-03-06

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 9.8
Base Score 9.8 Environmental Score 9.8
impact SubScore 5.9 Temporal Score 9.8
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9054

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 2
Os 2
Os 2
Os 1
Os 1
Os 1
Os 1
Os 4
Os 4
Os 4
Os 2
Os 2
Os 4
Os 1
Os 4
Os 2
Os 2
Os 2
Os 2
Os 2
Os 1
Os 2
Os 2
Os 1
Os 1
Os 1

Snort® IPS/IDS

Date Description
2020-04-28 Zyxel NAS devices command injection attempt
RuleID : 53510 - Revision : 1 - Type : SERVER-WEBAPP
2020-04-28 Zyxel NAS devices command injection attempt
RuleID : 53509 - Revision : 1 - Type : SERVER-WEBAPP
2020-04-28 Zyxel NAS devices command injection attempt
RuleID : 53508 - Revision : 1 - Type : SERVER-WEBAPP
2020-04-28 Zyxel NAS devices command injection attempt
RuleID : 53507 - Revision : 1 - Type : SERVER-WEBAPP

Sources (Detail)

Source Url
CERT-VN https://kb.cert.org/vuls/id/498544/
CONFIRM https://www.zyxel.com/support/remote-code-execution-vulnerability-of-NAS-prod...
MISC https://cwe.mitre.org/data/definitions/78.html
https://kb.cert.org/artifacts/cve-2020-9054.html
https://krebsonsecurity.com/2020/02/zyxel-fixes-0day-in-network-storage-devices/

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2021-04-22 03:10:36
  • Multiple Updates
2020-05-23 02:41:03
  • First insertion