ZyxelÐÞ¸´ÍøÂç´æ´¢²úÆ·ÖеÄ0dayÎó²îΣº¦Í¨¸æ

Ðû²¼Ê±¼ä 2020-02-27

Îó²î±àºÅºÍ¼¶±ð


CVE±àºÅ£ºCVE-2020-9054£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬CVSS·ÖÖµ£º³§ÉÌ×ÔÆÀ£º10£¬¹Ù·½Î´ÆÀ¶¨


Ó°Ïì°æ±¾


ÔËÐй̼þ°æ±¾5.21¼°¸üµÍ°æ±¾µÄNAS²úÆ·¡£


ÔËÐй̼þ°æ±¾ZLD V4.35²¹¶¡0µ½ZLD V4.35²¹¶¡2µÄUTM¡¢ATPºÍVPN·À»ðǽ¡£ZLD V4.35²¹¶¡0֮ǰµÄ¹Ì¼þ°æ±¾²»ÊÜÓ°Ïì


Îó²î¸ÅÊö


ÍøÂç×°±¸³§ÉÌZyxelÐû²¼Á˶à¿îÍøÂçÁ¥Êô´æ´¢£¨NAS£©×°±¸µÄ²¹¶¡£¬ÐÞ¸´Ò»¸öÒÑÔâµ½ÍøÂç·¸·¨·Ö×ÓʹÓõij¬Î£Îó²î¡£


¸ÃÎó²î±àºÅΪCVE-2020-9054£¬ÊÇÒ»¸öÎÞÐèÉí·ÝÈÏÖ¤¼´¿ÉʹÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¸ÃÎó²î±£´æÓÚweblogin.cgiÎļþÖУ¬Ô´ÓÚCGI¿ÉÖ´ÐÐÎļþδÄÜÎÈÍâµØ¹ýÂËÏòÆäת´ïµÄusername²ÎÊý¡£


ÃÀ¹úCERT/CCÌåÏÖ£¬ÈôÊÇÓû§ÃûÖаüÀ¨ÁËÌØ¶¨×Ö·û£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÒÔwebserverµÄȨÏÞ×¢ÈëÏÂÁî¡£½Ó×Å£¬¹¥»÷Õß¿ÉÒÔʹÓÃ×°±¸ÉϰüÀ¨µÄÒ»¸ösetuidÊÊÓóÌÐòÒÔrootȨÏÞÔËÐÐí§ÒâÏÂÁî¡£


ZyxelÔÚÇ徲ͨ¸æÖÐÚ¹ÊͳÆ£¬ÔËÐÐ5.21¼°Ö®Ç°°æ±¾¹Ì¼þµÄZyxelNAS²úÆ·µÄweblogin.cgi³ÌÐòÖз¢Ã÷ÁËÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¸Ã³ÌÐòȱÉÙÉí·ÝÈÏÖ¤£¬¹¥»÷Õß¿ÉʹÓÃÎó²îͨ¹ý×¢ÈëOSÏÂÁîÔ¶³ÌÖ´ÐдúÂë¡£


Ô¶³Ì¹¥»÷Õß¿Éͨ¹ý·¢ËÍÌØÖÆµÄHTTP POST»òGETÇëÇóÔÚųÈõµÄZyxel×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£×ÝÈ»¹¥»÷ÕßûÓÐÖ±½ÓÅþÁ¬×°±¸£¨ÈôÊÇ×°±¸Ã»ÓÐ̻¶ÔÚÍøÂçÖУ©£¬¿ÉÊÇÊܺ¦ÕßÅþÁ¬Á˶ñÒâµÄÍøÕ¾£¬Ò²¿É´¥·¢¸ÃÎó²î¡£


Îó²îÑéÖ¤


¸ÃÎó²îµÄexploitÔÚµØÏÂÂÛ̳³öÊÛÒÑÓÐÒ»¶Îʱ¼ä£¬±ê¼Û2ÍòÃÀÔª¡£×¨ÃŰ²ÅÅÀÕË÷Èí¼þµÄÍÅ»ïÒѾ­¶Ô¸ÃexploitÌåÏÖÐËȤ£¬EmotetÍÅ»ïÒ²ÍýÏ뽫¸Ãexploit·Åµ½ËûÃǵĶñÒâÈí¼þÖС£


ÐÞ¸´½¨Òé


ZyxelÐû²¼ÁËËÄ¿îųÈõµÄ×°±¸µÄ²¹¶¡£¬Ò²¾ÍÊÇNAS326£¬NAS520£¬NAS540ºÍNAS542£¬ÒÔ¼°UTM¡¢ATPºÍVPN·À»ðǽµÄ²¹¶¡£¬Á´½Ó£ºhttps://www.zyxel.com/support/remote-code-execution-vulnerability-of-NAS-products.shtml¡£


ÉÐÓÐ10¿îNAS²úÆ·²»ÔÙ»ñµÃZyxelÖ§³Ö£¬½«²»»áÊÕµ½²¹¶¡¡£ÕâЩ²úÆ·°üÀ¨

NSA210£¬NSA220£¬NSA220+£¬NSA221£¬NSA310£¬NSA310S£¬NSA320£¬NSA320S£¬NSA325ºÍNSA325v2¡£


ÕâЩװ±¸µÄ»º½â²½·¥°üÀ¨×èµ²¶Ô web ½Ó¿Ú£¨80/tcp ºÍ 443/tcp£©µÄ»á¼ûȨÏÞ²¢È·±£¸Ã NAS δ±»Ì»Â¶ÔÚ»¥ÁªÍøÉÏ¡£ÈôÓпÉÄÜ£¬Ôò½«ÆäÅþÁ¬µ½Ç徲·ÓÉÆ÷»ò°²ÅÅ·À»ðǽ¾ÙÐнøÒ»²½·À»¤¡£


²Î¿¼Á´½Ó


https://www.securityweek.com/zyxel-devices-can-be-hacked-dns-requests-hardcoded-credentials