Zyxel security advisory for vulnerabilities of CloudCNM SecuManager


Zyxel CloudCNM SecuManager software is affected by hardcoded credentials and missing authentication vulnerabilities. We’re currently working with our vendor to fix the issues and will reach out to individual customers directly to roll out the solution.


What is the vulnerability?

Multiple vulnerabilities were identified in Zyxel CloudCNM SecuManager, namely:

  • Hardcoded SSH server keys
  • Backdoors accounts in MySQL
  • Hardcoded certificate and backdoor access in Ejabberd
  • Open ZODB storage without authentication
  • MyZyxel 'Cloud' Hardcoded Secret
  • Hardcoded Secrets, APIs
  • Predefined passwords for admin accounts
  • Insecure management over the 'Cloud'
  • xmppCnrSender.py log escape sequence injection
  • xmppCnrSender.py no authentication and clear-text communication
  • Incorrect HTTP requests cause out of range access in Zope
  • XSS on the web interface
  • Private SSH key
  • Backdoor APIs
  • Backdoor management access and RCE
  • Pre-auth RCE with chrooted access

What products are vulnerable—and what should you do?

After a thorough investigation, we’ve confirmed that the vulnerabilities affect only CloudCNM SecuManager, a network management tool customized for specific customer demands. Other Zyxel products and services are NOT affected by the reported vulnerabilities.

CloudCNM SecuManager is co-developed with a third-party vendor. Zyxel has taken immediate action to work with the vendor to resolve the issues, making this our top priority. We’ll reach out to individual customers to roll out the solution once it becomes available.


Got a question or a tipoff?

Please contact your local service rep for further information or assistance. If you’ve found a vulnerability, we want to work with you to fix it—contact security@zyxel.com.tw and we’ll get right back to you.




Revision history

2020-03-13: Initial release