CVE-2024-29976

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers on Zyxel NAS devices to view administrator session information including cookies via the 'show_allsessions' command. This affects Zyxel NAS326 and NAS542 models running outdated firmware. Attackers could potentially hijack administrator sessions.

💻 Affected Systems

Products:
  • Zyxel NAS326
  • Zyxel NAS542
Versions: NAS326 firmware before V5.21(AAZF.17)C0, NAS542 firmware before V5.21(ABAG.14)C0
Operating Systems: Zyxel proprietary NAS firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the device web interface or command line.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal administrator session cookies, gain administrative privileges, and fully compromise the NAS device including data theft, ransomware deployment, or using it as an attack pivot point.

🟠

Likely Case

An authenticated user (including low-privilege accounts) could escalate privileges to administrator level by stealing session cookies and accessing sensitive data or configuration settings.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to the NAS device itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in a specific command that reveals session information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NAS326: V5.21(AAZF.17)C0 or later, NAS542: V5.21(ABAG.14)C0 or later

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nas-products-06-04-2024

Restart Required: Yes

Instructions:

1. Log into Zyxel NAS web interface as administrator. 2. Navigate to Maintenance > Firmware. 3. Upload and install the latest firmware from Zyxel's support site. 4. Reboot the device after installation completes.

🔧 Temporary Workarounds

Restrict Access to Management Interface

all

Limit access to the NAS web interface and SSH to trusted IP addresses only

Implement Strong Authentication Controls

all

Enforce multi-factor authentication and strong password policies for all user accounts

🧯 If You Can't Patch

  • Isolate affected NAS devices in a separate VLAN with strict firewall rules
  • Monitor for unusual authentication patterns or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface under Maintenance > Firmware or via SSH using 'cat /etc/version'

Check Version:

cat /etc/version

Verify Fix Applied:

Verify firmware version is NAS326: V5.21(AAZF.17)C0 or later, NAS542: V5.21(ABAG.14)C0 or later

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login
  • Unusual access to 'show_allsessions' command or similar session enumeration
  • Administrator account login from unexpected IP addresses

Network Indicators:

  • HTTP requests to session-related endpoints from non-admin users
  • Unusual traffic patterns to NAS management interface

SIEM Query:

source="zyxel_nas" AND (event="session_enumeration" OR command="show_allsessions")

🔗 References

📤 Share & Export