TechCrunch News 02月05日
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

台湾硬件制造商Zyxel表示,不会发布补丁来修复影响数千客户的两个正在被利用的漏洞。GreyNoise警告说,影响Zyxel路由器的严重零日漏洞正在被积极利用,允许攻击者在受影响的设备上执行任意命令,导致系统完全崩溃、数据泄露或网络渗透。Zyxel声称,这些漏洞影响的是多款已停产的产品,因此没有计划发布补丁来修复它们,而是建议客户更换路由器。VulnCheck指出,受影响的设备未在Zyxel的EOL页面上列出,某些型号仍可通过亚马逊购买。Censys的数据显示,仍有近1500台易受攻击的设备暴露在互联网上。

⚠️ Zyxel路由器存在两个严重漏洞CVE-2024-40890和CVE-2024-40891,允许攻击者执行任意命令,威胁系统安全。

📅 这些漏洞最早由VulnCheck于去年7月发现并报告给Zyxel,但Zyxel并未及时修复或正式披露,直至GreyNoise报告漏洞被积极利用后,Zyxel才公开承认。

🚫 Zyxel表示由于受影响的设备是已停产多年的旧产品,因此拒绝发布补丁修复漏洞,建议用户更换新一代产品。

🛒 VulnCheck指出,部分受影响的设备仍在亚马逊上销售,表明这些设备仍在广泛使用,并持续受到攻击者的关注。

Taiwanese hardware maker Zyxel says it has no plans to release a patch for two actively exploited vulnerabilities affecting potentially thousands of customers. 

Threat intelligence startup GreyNoise warned late last month that a critical-rated zero-day vulnerability impacting Zyxel routers was being actively exploited. GreyNoise said the flaws allow attackers to execute arbitrary commands on affected devices, leading to complete system compromise, data exfiltration, or network infiltration.

The vulnerabilities were discovered by threat intelligence organization VulnCheck in July last year and reported to Zyxel the following month, according to GreyNoise, but had yet to be patched or formally disclosed by the manufacturer. 

In an advisory this week, Zyxel said it “recently” became aware of the two vulnerabilities — now formally tracked as CVE-2024-40890 and CVE-2024-40891 — which it says impact multiple end-of-life products.

The company claims that the flaws were not reported to it by VulnCheck and says it first became aware of them on January 29, a day after GreyNoise reported active exploitation.

Zyxel, whose devices are used by more than 1 million businesses, says that since these bugs affect “legacy products that have reached end-of-life [EOL] for years” it has no plans to release patches to fix them. Instead, the company is advising customers to replace vulnerable routers with “newer-generation products for optimal protection.”

In a blog post on Tuesday, VulnCheck notes that the impacted devices are not listed on Zyxel’s EOL page and says some of the affected models are still available for purchase through Amazon, which TechCrunch has confirmed.

“While these systems are older and seemingly long out of support, they remain highly relevant due to their continued use worldwide and the sustained interest from attackers,” Jacob Baines, CTO at VulnCheck, said. 

According to Censys, a search engine for Internet of Things devices and Internet assets, almost 1,500 vulnerable devices remain exposed to the Internet. 

In an update last week, GreyNoise said that it had observed detected botnets, including Mirai, exploiting one of the Zyxel vulnerabilities, suggesting it is being used in large-scale attacks.

Zyxel spokesperson Birgitte Larsen did not respond to TechCrunch’s multiple requests for comment.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Zyxel 路由器漏洞 网络安全 漏洞修复
相关文章