Zyxel Multiple Firewall Vulnerabilities
Actively exploited and causing denial of service
https://www.zyxel.com/global/en/support/security-advisories/zyxels-guidance-for-the-recent-attacks-on-the-zywall-devices
Multiple critical vulnerabilities affecting various Zyxel devices have been seen exploited in the wild. The attackers are observed deploying Mirai like botnet inducing denial of service conditions. One of the vulnerability, CVE-2023-28771 which allows unauthenticated attackers to execute OS commands remotely has a publicly available proof of concept (PoC).
Background
Zyxel Networks is a communications equipment company with over 100 million devices globally and serving 1 million customers according to their website. The recent discovered vulnerabilities has been seen exploited in the wild and reportedly exploited by Mirai based botnet variant to cause DDoS. As reported by FortiGuard Outbreak Alerts on December 2022, the Zyxel USG FLEX was previously targetted by the Zerobot malware due to its OS command injection vulnerability (CVE-2022-30525). According to a Shodan search there are 40,000+ Zyxel devices exposed to internet and the number of vulnerable devices could be much more as the default setting of some of the devices are not internet exposed.
Announced
April 25, 2023: Initial release of advisory from vendor on CVE-2023-28771, CVE-2023-33009, CVE-2023-33010 May 31, 2023: CISA added CVE-2023-28771 to its Known Exploited Vulnerability catalog (KEV). June 5, 2023: CISA added CVE-2023-33009 and CVE-2023-33010 to its Known Exploited Vulnerability catalog (KEV).
Latest Developments
June 5, 2023: Mirai based botnet remain active, lately affecting multiple IoT devices. Go to Addtional resources to review the Outbreaks and vulnerabilties related/affected by Mirai based Botnet. June 5, 2023: FortiGuard added Threat Signal on Zyxel Multiple Firewall Vulnerabilities July 19, 2023: FortiGuard Labs released a detailed analyis blog article on DDoS botnets targeting Zyxel Vulnerability. FortiGuard Labs has released an IPS signature to detect any attack attempts to exploit CVE-2023-28771 and further investigating protections for CVE-2023-33009 and CVE-2023-33010. Antivirus signatures to detect and block known malware related to exploitation of vulnerable Zyxel devices. It is strongly recommended to update ATP, USG Flex, VPN, and ZyWALL/USG firewalls to prevent exploitation of recent vulnerabilities as per vendor advisory to fully mitigate the risk and look for DoS "Denial of Service" like symptoms that could arise if compromised.
arrow_icon
PROTECT

Countermeasures across the security fabric for protecting assets, data and network from cybersecurity events:

Reconnaissance

Lure

Detects attack attempts related to Zyxel Multiple Firewall Vulnerabilities and prevents lateral movement on the network segment

Decoy VM

Detects attack attempts related to Zyxel Multiple Firewall Vulnerabilities and prevents lateral movement on the network segment

Weaponization

Delivery

AV

Detects and blocks Marai based botnet related to Zyxel vulnerabilities

DB 91.03837
DB 91.03837
DB 91.03837
DB 91.03837
DB 91.03837
DB 91.03837
DB 91.03837
DB 91.03837
DB 91.03837
AV (Pre-filter)

Detects and blocks Marai based botnet related to Zyxel vulnerabilities

DB 91.03837
DB 91.03837
DB 91.03837

Exploitation

IPS

Detects and blocks OS Command Injection vulnerability (CVE-2023-28771)

DB 23.571
DB 23.571
DB 23.571
DB 23.571
DB 23.571
Installation
C2
Action
arrow_icon
DETECT

Find and correlate important information to identify an outbreak, the following updates are available to raise alert and generate reports:

Outbreak Detection

DB 2.00008
Threat Hunting
Content Update

DB 316
arrow_icon
RESPOND

Develop containment techniques to mitigate impacts of security events:

Automated Response

Services that can automaticlly respond to this outbreak.

Assisted Response Services

Experts to assist you with analysis, containment and response activities.

arrow_icon
RECOVER

Improve security posture and processes by implementing security awareness and training, in preparation for (and recovery from) security incidents:

InfoSec Services

Security readiness and awareness training for SOC teams, InfoSec and general employees.

arrow_icon
IDENTIFY

Identify processes and assets that need protection:

Attack Surface Monitoring (Inside & Outside)

Security reconnaissance and penetration testing services, covering both internal & external attack vectors, including those introduced internally via software supply chain.