In association with heise online

04 May 2011, 11:51

Vulnerabilities in Zyxel's ZyWall products

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

ZyWALL Collage

The web-based user interface of the ZyWall range of productsGerman language link contains vulnerabilities that allow unauthorised attackers to obtain data and reconfigure devices. The ZyXEL USG 20, 20W, 50, 100, 200, 300, 1000, 1050 and 2000 appliances are affected.

According to RedTeam Pentesting, attackers can modify a JavaScript variable stored on the client side in a browser to bypass the authentication mechanism and download the configuration file, as well as the password hashes stored in it. However, there appears to be an even simpler way: the file can reportedly be downloaded without any authentication by entering the full URL in a browser.

Attackers can then crack the passwords, or upload a modified configuration file. RedTeam says that this is also possible without authentication using a trick: for instance, an attacker could insert a password hash and then use this password to log in later as an admin. All that's required for an attack to be successful is that the web interface is accessible; curl, wget or a browser are the only tools needed.

RedTeam also managed to decrypt the encrypted firmware using a known-plaintext attack. Zyxel released new firmware to fix the problems on 25 April.


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit