Zyxel security advisory for OS command injection vulnerabilities of GS1900, XGS1210, and XGS1250 series switches
Zyxel has released patches addressing OS command injection vulnerabilities in the GS1900, XGS1210, and XGS1250 series of switches. Users are advised to install the applicable firmware updates for optimal protection.
What are the vulnerabilities?
An OS command injection vulnerability was identified in the TFTP client of Zyxel’s GS1900, XGS1210, and XGS1250 series of switches, such that an authenticated local user could execute arbitrary OS commands via the GUI of the vulnerable device.
An OS command injection vulnerability was identified in the libsal.so of Zyxel’s GS1900 series switches, such that an authenticated local user could execute OS commands via internal function calls.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable switches for CVE-2021-35031 and CVE-2021-35032 with their firmware patches shown in the table below.
|CVE||Affected model||Patch availability|
Got a question?
Please contact your local service rep or visit Zyxel’s forum for further information or assistance.
Thanks to Jasper Lievisse Adriaanse for reporting the issue to us.
2021-12-28: Initial release
2022-6-13: Update the patch availability in the table. Users are requested to contact Zyxel’s local support team for the standard firmware in the interim.
2022-9-1: Update the patch availability of the GS1900 series