CVE-2024-38267

4.9 MEDIUM

📋 TL;DR

This vulnerability allows authenticated administrators to cause memory corruption in the IPv6 parser of Zyxel VMG8825-T50K devices, potentially crashing threads. It affects devices running firmware versions through 5.50(ABOM.8)C0. Attackers need administrative credentials to exploit this issue.

💻 Affected Systems

Products:
  • Zyxel VMG8825-T50K
Versions: through 5.50(ABOM.8)C0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires IPv6 functionality and administrative access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Thread crash leading to denial of service, potentially disrupting network services on the affected device.

🟠

Likely Case

Localized thread crash affecting specific IPv6 processing functions without complete device failure.

🟢

If Mitigated

Minimal impact if proper access controls prevent unauthorized administrative access.

🌐 Internet-Facing: MEDIUM - Devices exposed to the internet could be targeted by attackers with stolen credentials.
🏢 Internal Only: MEDIUM - Insider threats or compromised internal accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated administrative access and knowledge of memory corruption techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 5.50(ABOM.8)C0

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-memory-corruption-vulnerabilities-in-some-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-security-router-versions-09-24-2024

Restart Required: Yes

Instructions:

1. Log into Zyxel support portal. 2. Download latest firmware for VMG8825-T50K. 3. Upload firmware via web interface. 4. Apply update and restart device.

🔧 Temporary Workarounds

Disable IPv6

all

Turn off IPv6 functionality to prevent exploitation of the vulnerable parser.

Restrict Administrative Access

all

Limit administrative access to trusted IP addresses and use strong authentication.

🧯 If You Can't Patch

  • Implement strict access controls for administrative interfaces
  • Monitor for unusual administrative login attempts or thread crashes

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System Info > Firmware Version

Check Version:

Check via web interface or SSH: show version

Verify Fix Applied:

Verify firmware version is newer than 5.50(ABOM.8)C0

📡 Detection & Monitoring

Log Indicators:

  • Thread crash logs
  • IPv6 processing errors
  • Multiple failed admin login attempts

Network Indicators:

  • Unusual IPv6 traffic patterns to administrative interfaces

SIEM Query:

source="zyxel" AND (event_type="thread_crash" OR event_type="ipv6_error")

🔗 References

📤 Share & Export