CVE-2024-7203
📋 TL;DR
This vulnerability allows authenticated administrators on affected Zyxel firewalls to execute arbitrary operating system commands through command injection in the CLI. It affects Zyxel ATP and USG FLEX series firewalls running firmware versions V4.60 through V5.38.
💻 Affected Systems
- Zyxel ATP series
- Zyxel USG FLEX series
📦 What is this software?
Zld by Zyxel
Zld by Zyxel
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise leading to network pivoting, data exfiltration, or deployment of persistent backdoors.
Likely Case
Privilege escalation to root access, configuration manipulation, or lateral movement within the network.
If Mitigated
Limited impact if proper access controls restrict administrative accounts and network segmentation is implemented.
🎯 Exploit Status
Exploitation requires authenticated admin access; command injection via crafted CLI commands.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V5.39 or later
Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-09-03-2024
Restart Required: Yes
Instructions:
1. Download firmware V5.39 or later from Zyxel support portal. 2. Backup current configuration. 3. Upload and install new firmware via web interface or CLI. 4. Reboot device after installation.
🔧 Temporary Workarounds
Restrict Administrative Access
allLimit administrative access to trusted IP addresses and use strong, unique passwords.
Network Segmentation
allSegment firewall management interfaces from general user networks.
🧯 If You Can't Patch
- Implement strict access controls for administrative accounts and monitor for suspicious CLI activity.
- Isolate affected devices in a dedicated management VLAN with limited network access.
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface (System > Maintenance > Firmware) or CLI command 'show version'.
Check Version:
show version
Verify Fix Applied:
Confirm firmware version is V5.39 or later using the same methods.
📡 Detection & Monitoring
Log Indicators:
- Unusual CLI command execution patterns
- Multiple failed login attempts followed by successful admin login
Network Indicators:
- Unexpected outbound connections from firewall management interface
- Anomalous traffic patterns post-admin login
SIEM Query:
source="firewall_logs" AND (event_type="cli_command" AND command="*;*" OR command="*|*")