CVE-2024-12398

8.8 HIGH

📋 TL;DR

An authenticated user with limited privileges can escalate to administrator level on affected Zyxel devices, allowing them to upload configuration files and potentially take full control. This affects Zyxel WBE530 and WBE660S devices running vulnerable firmware versions. Attackers with initial access can exploit this to compromise network security.

💻 Affected Systems

Products:
  • Zyxel WBE530
  • Zyxel WBE660S
Versions: WBE530 firmware through 7.00(ACLE.3), WBE660S firmware through 6.70(ACGG.2)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web management interface. Requires authenticated access but with limited privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to reconfigure network settings, intercept traffic, install backdoors, or use device as pivot point for lateral movement.

🟠

Likely Case

Privileged attacker gains administrative control, modifies device configuration, and potentially disrupts network operations or steals sensitive data.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent initial authentication by unauthorized users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access with limited privileges. Exploitation likely involves manipulating web interface requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WBE530: firmware version after 7.00(ACLE.3), WBE660S: firmware version after 6.70(ACGG.2)

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-improper-privilege-management-vulnerability-in-aps-and-security-router-devices-01-14-2025

Restart Required: Yes

Instructions:

1. Download latest firmware from Zyxel support portal. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply firmware update. 5. Restart device. 6. Verify firmware version.

🔧 Temporary Workarounds

Restrict web interface access

all

Limit access to management interface to trusted IP addresses only

Disable unnecessary user accounts

all

Remove or disable any non-essential user accounts with limited privileges

🧯 If You Can't Patch

  • Segment affected devices on isolated network segments
  • Implement strict access controls and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface under System > Firmware or via CLI command 'show version'

Check Version:

show version

Verify Fix Applied:

Verify firmware version is above vulnerable versions: WBE530 > 7.00(ACLE.3), WBE660S > 6.70(ACGG.2)

📡 Detection & Monitoring

Log Indicators:

  • Multiple privilege escalation attempts
  • Configuration file uploads by non-admin users
  • Unusual admin account activity

Network Indicators:

  • Unusual traffic patterns from management interface
  • Configuration uploads to unexpected destinations

SIEM Query:

source="zyxel_logs" AND (event_type="privilege_escalation" OR event_type="config_upload")

🔗 References

📤 Share & Export