A team of researchers has revealed the finding of a couple of vulnerabilities in some network attached storage (NAS) products from ZyXEL, a China-based company that develops multiple network enterprise solutions. According to the report, successful exploiting of flaws would allow threat actors to bypass access controls to vulnerable systems with relatively ease.
Below are brief descriptions of reported vulnerabilities, in addition to their respective scores and identification keys according to the Common Vulnerability Scoring System (CVSS).
CVE-2020-13364: Inadequate access restrictions on a CGI script for web applications would allow threat actors to gain unauthorized access to restricted features. Malicious hackers could initiate Telnet or SSH services to generate a password for the “NsaRescueAngel” user account.
This is an average severity vulnerability that received a score of 7.1/10.
CVE-2020-13365: A series of inappropriate access restrictions in a CGI script for affected web applications would allow threat actors to initiate Telnet or SSH services to generate an account access password with root privileges to “NsaRescueAngel”, allowing threat actors to gain unauthorized access to restricted functionalities.
Like the previous case, experts consider this to be an average severity failure, so it received a score of 7.1/10.
Both vulnerabilities reside in the following products:
- Zyxel NAS 326
- NAS520
- NAS540
- NAS542
While vulnerabilities can be exploited by unauthenticated remote threat actors, specialists have not detected attempts to exploit actively. ZyXEL has already released the required updates, so users of affected deployments will need to update as soon as possible. More details about vulnerabilities and their potential mitigation methods are available on the company’s official platforms.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.