June 5, 2024 at 01:38PM
Zyxel released security patches for its obsolete NAS326 and NAS542 devices after critical vulnerabilities were reported by an intern at a security vendor. The vulnerabilities, including a backdoor account and code injection flaws, could lead to remote code execution and other issues. Patches are available despite the devices reaching end-of-life status.
Key takeaways from the meeting notes:
– Zyxel has released security fixes for two of its obsolete network-attached storage (NAS) devices, NAS326 and NAS542, after critical vulnerabilities were reported by an intern at a security vendor, Outpost24.
– The vulnerabilities could lead to remote code execution (RCE) and other issues and have received high CVSSv3 severity scores.
– The vulnerabilities include a backdoor account called “NsaRescueAngel,” a Python code injection flaw, and an RCE bug that achieves persistence.
– The critical flaws have been patched with new firmware versions V5.21(AAZF.17)C0 for NAS326 devices and V5.21(ABAG.14)C0 for NAS542 boxes.
– Two additional vulnerabilities, both privilege escalation flaws, have also been addressed with the new patches.
– It is unclear if the vulnerabilities have been exploited in the wild, but given the potential danger, it is important to apply the patches immediately.
Let me know if you need further information or assistance!