CVE-2023-6398

7.2 HIGH

📋 TL;DR

This CVE describes a post-authentication command injection vulnerability in Zyxel firewall and access point firmware. An authenticated attacker with administrator privileges can execute OS commands on affected devices via FTP file upload functionality. This affects multiple Zyxel ATP, USG FLEX, USG20(W)-VPN, NWA50AX, WAC500, WAX300H, and WBE660S series devices.

💻 Affected Systems

Products:
  • Zyxel ATP series
  • USG FLEX series
  • USG FLEX 50(W) series
  • USG20(W)-VPN series
  • USG FLEX H series
  • NWA50AX
  • WAC500
  • WAX300H
  • WBE660S
Versions: ATP: 4.32-5.37 Patch 1; USG FLEX: 4.50-5.37 Patch 1; USG FLEX 50(W): 4.16-5.37 Patch 1; USG20(W)-VPN: 4.16-5.37 Patch 1; USG FLEX H: 1.10-1.10 Patch 1; NWA50AX: through 6.29(ABYW.3); WAC500: through 6.65(ABVS.1); WAX300H: through 6.60(ACHF.1); WBE660S: through 6.65(ACGG.1)
Operating Systems: Zyxel proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated attacker with administrator privileges. FTP service must be enabled/accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to install persistent backdoors, pivot to internal networks, exfiltrate sensitive data, or disrupt network operations.

🟠

Likely Case

Attacker gains shell access to device, can modify configurations, create backdoor accounts, or use device as pivot point for lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place to detect anomalous FTP activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid admin credentials and FTP access. Command injection via file upload suggests straightforward exploitation once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions per product line

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps-02-20-2024

Restart Required: Yes

Instructions:

1. Identify affected devices and current firmware versions. 2. Download appropriate patched firmware from Zyxel support portal. 3. Backup current configuration. 4. Apply firmware update via web interface or CLI. 5. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Disable FTP service

all

Disable FTP file upload functionality if not required for operations

Restrict admin access

all

Limit administrative access to trusted IP addresses and implement strong authentication

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected devices from critical assets
  • Enable detailed logging for FTP and administrative activities and monitor for anomalies

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against affected ranges in vendor advisory

Check Version:

Check via web interface: System > Maintenance > Firmware or via CLI: show version

Verify Fix Applied:

Verify firmware version is updated to patched version specified in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual FTP file upload activities
  • Multiple failed authentication attempts followed by successful admin login
  • Commands executed via FTP upload process

Network Indicators:

  • Unexpected outbound connections from firewall/AP devices
  • FTP traffic to/from administrative interfaces

SIEM Query:

source="zyxel_firewall" AND (event="ftp_upload" OR event="command_execution")

🔗 References

📤 Share & Export