CVE-2022-26532

7.8 HIGH

📋 TL;DR

This CVE-2022-26532 is an argument injection vulnerability in Zyxel network devices that allows local authenticated attackers to execute arbitrary OS commands via crafted arguments to the 'packet-trace' CLI command. It affects multiple Zyxel firewall, VPN, and access point product lines. Attackers with local access can escalate privileges to gain full system control.

💻 Affected Systems

Products:
  • Zyxel USG/ZyWALL series
  • USG FLEX series
  • ATP series
  • VPN series
  • NSG series
  • NXC2500
  • NAP203
  • NWA50AX
  • WAC500
  • WAX510D
Versions: USG/ZyWALL: 4.09-4.71; USG FLEX: 4.50-5.21; ATP: 4.32-5.21; VPN: 4.30-5.21; NSG: 1.00-1.33 Patch 4; NXC2500: ≤6.10(AAIG.3); NAP203: ≤6.25(ABFA.7); NWA50AX: ≤6.25(ABYW.5); WAC500: ≤6.30(ABVS.2); WAX510D: ≤6.30(ABTF.2)
Operating Systems: Zyxel proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices with default configurations are vulnerable. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to install persistent backdoors, exfiltrate sensitive data, pivot to other network segments, and disrupt network operations.

🟠

Likely Case

Privilege escalation from authenticated user to root/admin access, enabling credential theft, configuration modification, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and command execution restrictions are implemented.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable from internet.
🏢 Internal Only: HIGH - Any authenticated user on affected devices can exploit this vulnerability to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details and proof-of-concept code are publicly available. Requires authenticated access but exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions per product line

Vendor Advisory: https://www.zyxel.com/support/multiple-vulnerabilities-of-firewalls-AP-controllers-and-APs.shtml

Restart Required: Yes

Instructions:

1. Identify affected device model and current firmware version. 2. Download appropriate patched firmware from Zyxel support portal. 3. Backup current configuration. 4. Apply firmware update via web interface or CLI. 5. Reboot device. 6. Verify successful update.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit access to CLI interface to only authorized administrators

Implement Least Privilege

all

Ensure users only have necessary permissions and cannot access packet-trace command

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Monitor for suspicious CLI command execution and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against affected ranges in vendor advisory

Check Version:

show version (CLI) or check System Information in web interface

Verify Fix Applied:

Verify firmware version is updated beyond affected ranges and test packet-trace command functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual packet-trace command usage
  • Multiple failed authentication attempts followed by successful login and command execution
  • Privilege escalation patterns

Network Indicators:

  • Unexpected outbound connections from network devices
  • Anomalous traffic patterns from management interfaces

SIEM Query:

source="zyxel_device" AND (event="packet-trace" OR event="command_injection" OR user_privilege_change="true")

🔗 References

📤 Share & Export