Threat Actors Actively Scanning for Vulnerable Zyxel Devices

NJCCIC Alert

Original Release Date: 1/7/2021

Summary

Threat actors are actively scanning for open SSH ports after a vulnerability was recently revealed in Zyxel Firewall and AP Controllers. The vulnerability, CVE-2020-29583 , may allow for remote administrative access, granting an attacker the ability to change firewall settings, intercept traffic, create VPN accounts to gain access to the network behind the device, and perform additional administrative functions. This vulnerability exists due to hardcoded administrative credentials used to update firewall and AP controllers firmware. The login name is 'zyfwp' and has a static plain-text password that cannot be changed. Researchers at GreyNoise discovered at least three different IPs actively scanning for SSH ports and attempting to use the Zyxel backdoor credentials. Affected systems include Zyxel Firewall ATP, USG, USG FLEX, and VPN version 4.60, and Zyxel AP Controllers NXC2500 and NXC5500 version 6.10. Zyxel released the ZLD V4.60 Patch 1, and plans to roll out a patch for AP controllers on January 8, 2021.

Recommendations

The NJCCIC recommends users of affected Zyxel devices apply patches immediately after appropriate testing, apply the Principle of Least Privilege to all systems and services, and close unnecessary ports. Additional reporting can be found in the Bleeping Computer article.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.