A significant zero-day vulnerability in Zyxel CPE series devices, identified as CVE-2024-40891, is being actively exploited by attackers.
This vulnerability enables attackers to execute arbitrary commands on affected devices, posing significant risks of system compromise, data theft, and network infiltration.
Over 1,500 infected devices have been discovered to be susceptible to this exploit, according to Censys scans; the vulnerability has not been fixed or publicly disclosed.
The vulnerability is a command injection flaw in the telnet interface of Zyxel CPE devices. It allows unauthenticated attackers to execute arbitrary commands by exploiting service accounts such as “supervisor” or “zyuser.”
Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free
The command injection vulnerability arises from improper input validation in the telnet management interface of Zyxel CPE devices.
By sending specially crafted telnet requests, attackers can inject and execute arbitrary system commands. This flaw is particularly dangerous because it does not require authentication, making it easy for attackers to exploit without needing valid credentials.
This issue is similar to another vulnerability, CVE-2024-40890, which is based on HTTP rather than telnet. Both vulnerabilities are critical as they bypass authentication mechanisms entirely. Researchers at GreyNoise and VulnCheck have confirmed the exploitation of CVE-2024-40891.
GreyNoise has observed active exploitation attempts in the wild, while VulnCheck initially disclosed the vulnerability to its partners under the name “Zyxel CPE Telnet Command Injection” on August 1, 2024.
Despite this disclosure, Zyxel has yet to release an official advisory or patch for this critical issue.
Given the critical nature of this vulnerability and the lack of an official patch, organizations using Zyxel CPE devices should take immediate action:
Organizations relying on Zyxel CPE devices must act swiftly to mitigate risks while awaiting a formal patch from the vendor.
Cybersecurity experts recommend continuous monitoring and strict access controls to safeguard against potential attacks stemming from this zero-day flaw.
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar
By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…
According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…
A critical security flaw in NVIDIA's Riva framework, an AI-powered speech and translation service, has…
CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative…
A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active…
A critical vulnerability in Google Chrome has recently been discovered that allows malicious actors to…