"Zyxel Firewalls Hacked by Mirai Botnet"

A Mirai botnet variant has been exploiting a recently patched vulnerability tracked as CVE-2023-28771 to hack many Zyxel firewalls.  The Taiwan-based networking device manufacturer informed customers about the security hole on April 25, when it announced the availability of patches for impacted ATP, VPN, USG Flex, and ZyWALL/USG firewalls.  Trapa Security found the OS command injection vulnerability, which is caused by improper error message handling in some firewalls, and it could allow an unauthenticated attacker to remotely execute OS commands by sending specially crafted packets to the targeted device.  By mid-May, security experts reported reproducing the exploit, and Rapid7 warned a few days later that it would likely end up being exploited in the wild.  Rapid7 said it had seen 42,000 instances of internet-exposed Zyxel device web interfaces but noted that the actual number of exploitable devices was likely much higher.  Researcher Kevin Beaumont revealed recently that CVE-2023-28771 has been "mass exploited" by a Mirai botnet variant, with many SMB appliances being impacted.  Mirai botnets typically abuse compromised devices to launch DDoS attacks, which can be massive. 

 

SecurityWeek reports: "Zyxel Firewalls Hacked by Mirai Botnet"

Submitted by Anonymous on