CVE-2022-30526

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Zyxel firewall CLI commands where a local attacker can execute OS commands with root privileges in specific directories. It affects multiple Zyxel firewall product lines running vulnerable firmware versions. Attackers with local access can gain full system control.

💻 Affected Systems

Products:
  • Zyxel USG FLEX 100(W)
  • USG FLEX 200
  • USG FLEX 500
  • USG FLEX 700
  • USG FLEX 50(W)
  • USG20(W)-VPN
  • ATP series
  • VPN series
  • USG/ZyWALL series
Versions: Multiple version ranges: 4.09-4.72 for USG/ZyWALL, 4.16-5.30 for USG FLEX 50(W) and USG20(W)-VPN, 4.30-5.30 for VPN series, 4.32-5.30 for ATP series, 4.50-5.30 for other USG FLEX models
Operating Systems: Zyxel proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default configurations. Requires local CLI access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, exfiltrate configuration data, pivot to internal networks, or disable firewall protections entirely.

🟠

Likely Case

Local authenticated attacker gains root privileges to modify firewall rules, intercept traffic, or access sensitive configuration data stored on the device.

🟢

If Mitigated

With proper network segmentation and access controls limiting local access, impact is reduced to authorized administrators only.

🌐 Internet-Facing: LOW (requires local access to device CLI)
🏢 Internal Only: HIGH (anyone with local CLI access can exploit)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local CLI access but is straightforward once access is obtained. Public exploit code exists in Packet Storm references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in firmware versions beyond the affected ranges (e.g., 5.31+ for most models)

Vendor Advisory: https://www.zyxel.com/support/Zyxel-security-advisory-authenticated-directory-traversal-vulnerabilities-of-firewalls.shtml

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from Zyxel support portal. 3. Backup configuration. 4. Upload and install firmware update. 5. Reboot device. 6. Verify updated version.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit local CLI access to trusted administrators only using access control lists and strong authentication.

Network Segmentation

all

Isolate management interfaces from general network access to prevent unauthorized local access.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access device CLI interfaces
  • Monitor for unusual CLI activity and privilege escalation attempts in logs

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Maintenance > Firmware) or CLI 'show version' command and compare to affected ranges.

Check Version:

show version

Verify Fix Applied:

Verify firmware version is beyond affected ranges (e.g., 5.31+ for most models) and test CLI command restrictions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command execution patterns
  • Privilege escalation attempts in system logs
  • Multiple failed authentication attempts followed by successful CLI access

Network Indicators:

  • Unexpected management interface access from unusual IPs
  • Anomalous traffic patterns post-CLI access

SIEM Query:

source="zyxel_firewall" AND (event_type="cli_command" AND command="*privilege*" OR command="*root*")

🔗 References

📤 Share & Export