Zyxel has released patches for products affected by the authentication bypass vulnerability. Users are advised to install them for optimal protection.
What is the vulnerability?
An authentication bypass vulnerability caused by the lack of a proper access control mechanism has been found in the CGI program of some firewall versions. The flaw could allow an attacker to bypass the authentication and obtain administrative access of the device.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable products that are within their warranty and support period and released updates to address the issue, as shown in the table below.
|Affected series||Affected firmware version||Patch availability|
|USG/ZyWALL||ZLD V4.20 through ZLD V4.70||ZLD V4.71|
|USG FLEX||ZLD V4.50 through ZLD V5.20||ZLD V5.21 Patch 1|
|ATP||ZLD V4.32 through ZLD V5.20||ZLD V5.21 Patch 1|
|VPN||ZLD V4.30 through ZLD V5.20||ZLD V5.21|
|NSG||V1.20 through V1.33 Patch 4||
*Please reach out to your local Zyxel support team for the file.
Got a question?
Please contact your local service rep or visit Zyxel’s forum for further information or assistance.
Thanks to the following researchers for reporting the issue to us:
2022-03-29: Initial release
2022-05-27: Updated the patch plan of the NSG series