Article Details
Scrape Timestamp (UTC): 2025-01-29 14:47:51.721
Original Article Text
Click to Toggle View
Hackers exploit critical unpatched flaw in Zyxel CPE devices. Hackers are exploiting a critical command injection vulnerability in Zyxel CPE Series devices that is currently tracked as CVE-2024-40891 and remains unpatched since last July. The vulnerability allows unauthenticated attackers to execute arbitrary commands using the ‘supervisor’ or ‘zyuser’ service accounts. Vulnerability intelligence company VulnCheck added the security issue to its database last year on July 12 and listed it among other issues exploited in the wild for initial access. Technical details on the vulnerability have not been publicly disclosed and Zyxel did not release a security advisory or a patch for CVE-2024-40891, and the issue remains exploitable in the latest firmware. It appears that hackers discovered how to leverage the vulnerability and are using it in attacks as threat monitoring platform GreyNoise has observed recently exploitation activity originating from multiple unique IP addresses. GreyNoise notes that the flaw is similar to CVE-2024-40890, which is HTTP-based. However, VulnCheck confirmed that the current exploitation detection is for the unpatched CVE-2024-40891, which is based on the telnet protocol. “GreyNoise is observing active exploitation attempts targeting a zero-day critical command injection vulnerability in Zyxel CPE Series devices tracked as CVE-2024-40891,” reads the bulletin. “At this time, the vulnerability is not patched, nor has it been publicly disclosed. Attackers can leverage this vulnerability to execute arbitrary commands on affected devices, leading to complete system compromise, data exfiltration, or network infiltration” - GreyNoise Internet scanning service Censys reports that there are more than 1,500 Zyxel CPE Series devices currently exposed online, mostly in the Philippines, Turkey, the United Kingdom, France, and Italy. Considering that no security update is available to address the problem, system administrators should at least try to block the IP addresses launching the exploitation attempts. However, this attacks from other IP addresses are still possible. For further mitigation, it is recommended to monitor traffic for atypical telnet requests to Zyxel CPE management interfaces, and restrict access to the administrative interface only to a specified IP allowlist. If remote management features are not used/needed, it is better to disable them entirely to reduce the attack surface. BleepingComputer has contacted Zyxel with a request for a comment, but we are still waiting for the vendor’s response.
Daily Brief Summary
Hackers are actively exploiting a critical vulnerability, CVE-2024-40891, in Zyxel CPE devices, which allows command injection without authentication.
The vulnerability was identified and added to the VulnCheck database on July 12 of the previous year, and remains unpatched in the latest firmware updates.
GreyNoise has detected recent exploitation attempts from multiple unique IP addresses, indicating that the vulnerability is being actively exploited in the wild.
The flaw is related to the telnet protocol and enables attackers to execute arbitrary commands on affected devices, potentially leading to complete system compromise.
Over 1,500 Zyxel CPE devices are exposed online across various countries, including the Philippines, Turkey, the UK, France, and Italy, increasing the potential impact of the flaw.
In the absence of an official patch from Zyxel, recommended temporary mitigation measures include blocking IP addresses known to be sources of exploitation and monitoring unusual telnet traffic.
Administrators are also advised to restrict access to device administrative interfaces and disable remote management features if they are unnecessary.