Zyxel has released patches addressing OS command injection vulnerabilities in the GS1900, XGS1210, and XGS1250 series of switches. Users are advised to install the applicable firmware updates for optimal protection.
What are the vulnerabilities?
An OS command injection vulnerability was identified in the TFTP client of Zyxel’s GS1900, XGS1210, and XGS1250 series of switches, such that an authenticated local user could execute arbitrary OS commands via the GUI of the vulnerable device.
An OS command injection vulnerability was identified in the libsal.so of Zyxel’s GS1900 series switches, such that an authenticated local user could execute OS commands via internal function calls.
What versions are vulnerable—and what should you do?
After a thorough investigation, we’ve identified the vulnerable switches for CVE-2021-35031 and CVE-2021-35032 that are within their warranty and support period, with their firmware patches shown in the table below.
|CVE||Affected model||Patch availability|
Got a question?
Please contact your local service rep or visit Zyxel’s forum for further information or assistance.
Thanks to Jasper Lievisse Adriaanse for reporting the issue to us.
2021-12-28: Initial release
2022-1-4: Updated patch availability
2022-2-8: Updated patch availability