CVE-2025-9133
📋 TL;DR
A missing authorization vulnerability in Zyxel firewall devices allows semi-authenticated attackers who have completed only the first stage of 2FA to view and download system configurations. This affects Zyxel ATP, USG FLEX, USG FLEX 50(W), and USG20(W)-VPN series firewalls with vulnerable firmware versions. Attackers could gain sensitive network information including firewall rules, VPN configurations, and network topology.
💻 Affected Systems
- Zyxel ATP series
- Zyxel USG FLEX series
- Zyxel USG FLEX 50(W) series
- Zyxel USG20(W)-VPN series
📦 What is this software?
Zld by Zyxel
Zld by Zyxel
Zld by Zyxel
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain complete network configuration including firewall rules, VPN credentials, and internal network topology, enabling further attacks or network compromise.
Likely Case
Attackers download configuration files containing sensitive network information, firewall rules, and potentially credentials for follow-on attacks.
If Mitigated
Limited exposure of configuration details if proper network segmentation and access controls are implemented.
🎯 Exploit Status
Exploitation requires attacker to have completed first authentication factor. No public exploit code is currently available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after V5.40 for all affected series
Restart Required: Yes
Instructions:
1. Download latest firmware from Zyxel support portal. 2. Backup current configuration. 3. Upload and install firmware update via web interface. 4. Reboot device. 5. Verify firmware version is above V5.40.
🔧 Temporary Workarounds
Disable web management access
allRestrict web management interface access to trusted IP addresses only
Configure firewall rules to restrict web management port (default 443) to specific source IPs
Enable full 2FA enforcement
allEnsure all administrative access requires complete 2FA authentication
Verify 2FA is enabled and configured to require both factors for all administrative functions
🧯 If You Can't Patch
- Implement strict network segmentation to isolate firewall management interfaces
- Monitor for unauthorized configuration download attempts and review access logs regularly
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface: System > Maintenance > Firmware or via CLI: show version
Check Version:
show version (CLI) or check System > Maintenance > Firmware in web interface
Verify Fix Applied:
Verify firmware version is above V5.40 and test that configuration download requires full 2FA authentication
📡 Detection & Monitoring
Log Indicators:
- Unauthorized configuration download attempts
- Access to configuration download endpoints without full 2FA completion
- Multiple failed 2FA attempts followed by configuration access
Network Indicators:
- Unexpected downloads of configuration files from firewall management interface
- Traffic to configuration download endpoints from untrusted sources
SIEM Query:
source="firewall_logs" AND (event="configuration_download" OR uri="/cgi-bin/download_config") AND NOT (auth_status="full_2fa")