CVE-2024-29972
Zyxel
CVE-2024-29972 is a command injection vulnerability affecting Zyxel NAS devices. This flaw in the "remote_help-cgi" CGI program allows unauthenticated attackers to execute operating system commands on vulnerable NAS326 and NAS542 devices via crafted HTTP POST requests. Despite a CVSS score of 0, the SOCRadar Vulnerability Risk Score (SVRS) is 46, indicating a moderate level of risk due to active exploits being available. Zyxel NAS326 and NAS542 users are advised to check if their firmware is within the vulnerable versions and to seek patches, though this CVE is marked as unsupported by the vendor. Successful exploitation grants attackers unauthorized control of the affected devices. The 'In The Wild' and 'Exploit Available' tags emphasize the urgency of addressing this vulnerability.
Description:
CVE-2024-29972 is a command injection vulnerability in Zyxel NAS326 and NAS542 firmware versions before V5.21(AAZF.17)C0 and V5.21(ABAG.14)C0, respectively. This vulnerability allows an unauthenticated attacker to execute arbitrary operating system commands by sending a crafted HTTP POST request. The SVRS score of 34 indicates a moderate risk, highlighting the need for attention and appropriate mitigation measures.
Key Insights:
- Remote Exploitation: The vulnerability can be exploited remotely, allowing attackers to target devices without physical access.
- Unauthenticated Access: Attackers do not require authentication to exploit this vulnerability, making it easier for them to compromise vulnerable systems.
- Potential Impact: Successful exploitation could lead to unauthorized access, data theft, or even complete system compromise.
Mitigation Strategies:
- Update Firmware: Install the latest firmware updates (V5.21(AAZF.17)C0 for NAS326 and V5.21(ABAG.14)C0 for NAS542) to patch the vulnerability.
- Disable Remote Access: If possible, disable remote access to the affected devices until the firmware update is applied.
- Network Segmentation: Implement network segmentation to isolate vulnerable devices from critical systems and resources.
Additional Information:
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- Exploit Status: Active exploits have not been published.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
- In the Wild: The vulnerability is not known to be actively exploited in the wild.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.