These popular VPNs, firewalls are actively under attack

Cybercriminals are launching attacks against vulnerable VPN and firewall devices from Zyxel, security researchers have warned. By levera...

Cybercriminals are launching attacks against vulnerable VPN and firewall devices from Zyxel, security researchers have warned.

By leveraging a critical vulnerability tracked as CVE-2022-30525 - present in ATP, VPN and some USG FLEX series products - attackers are able to bypass authentication and achieve remote code execution.

Although Zyxel rolled out a fix for the security bug last week, thousands of administrators have failed to install the necessary patch and the exploit is now being utilized openly in the wild.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Zyxel VPN vulnerability

The vulnerability in Zyxel’s business VPN devices was first identified by security firm Rapid7, which assisted the company with the remediation.

In a blog post detailing the bug, Rapid7 warned that attackers could abuse the issue to establish a reverse shell, a type of session that facilitates communication between the attacker and the target machine and sets the stage for further attacks.

The result is that the attacker could effectively seize full control of systems that are otherwise protected by a firewall and other network security measures.

In an advisory published by Zyxel alongside the patch, the company urged administrators to install the relevant update immediately. This sentiment was echoed on Twitter by the cybersecurity director of the NSA, such is the severity of the issue and popularity of Zyxel hardware.

The latest analysis shows that upwards of 15,000 vulnerable Zyxel products remain unpatched, the majority of which belong to companies based in France, Italy, Switzerland and the US, meaning the potential scope of attacks is significant.

To help organizations shield against and mitigate attacks, multiple security researchers have published useful resources online. A team operating under Spanish telecoms firm Telefonica, for example, has released a program that scans for vulnerable endpoints, and another researcher has published a tool to help detect intrusions related to the flaw.

Via Bleeping Computer 



from TechRadar - All the latest technology news https://ift.tt/iB0b8Xj
via IFTTT

COMMENTS

BLOGGER
Name

Apps,3858,Business,151,Camera,1155,Earn $$$,3,Gadgets,1741,Games,926,GTA,1,Innovations,3,Mobile,1697,Paid Promotions,5,Promotions,5,Sports,1,Technology,8106,Trailers,796,Travel,37,Trending,4,Trendly News,25335,TrendlyNews,110,Video,5,XIAOMI,13,YouTube - 9to5Google,109,
ltr
item
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: These popular VPNs, firewalls are actively under attack
These popular VPNs, firewalls are actively under attack
https://cdn.mos.cms.futurecdn.net/ybbmQ8p4Q999AkMWkW8HLm.jpg
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
http://www.trendlynews.in/2022/05/these-popular-vpns-firewalls-are.html
http://www.trendlynews.in/
http://www.trendlynews.in/
http://www.trendlynews.in/2022/05/these-popular-vpns-firewalls-are.html
true
3372890392287038985
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy