CyberSecurity updates
2025-02-09 07:08:08 Pacfic

Zyxel Won't Patch Exploited Zero-Days in Legacy Devices - 8d
Zyxel Won

Zyxel has announced that it will not be releasing patches for two actively exploited zero-day vulnerabilities, CVE-2024-40890 and CVE-2024-40891, affecting multiple legacy DSL CPE products. These vulnerabilities allow attackers to execute arbitrary commands. A Mirai botnet variant is exploiting CVE-2024-40891 in the wild. Zyxel recommends that users replace the end-of-life products with newer-generation devices for optimal protection.

The lack of patches for these exploited vulnerabilities in Zyxel devices poses a significant risk to users who continue to use them. This incident highlights the importance of vendors providing ongoing security support for their products, even after they reach end-of-life.

Kubernetes Windows Nodes Remote Hack - 14d

A critical remote code execution vulnerability (CVE-2024-9042) in Kubernetes allows attackers to execute commands with SYSTEM privileges on all Windows nodes in a cluster. This vulnerability, specifically in the new beta logging feature ‘Log Query’, is easily exploitable, resulting in full system compromise. This highlights the danger of introducing new features without thorough security testing, impacting organizations that rely on Kubernetes. Immediate patching is vital to prevent potential unauthorized access and lateral movement within the Kubernetes environment.

Four-Faith Router Flaw Enables Remote Attacks - 9d

A critical vulnerability, CVE-2024-12856, has been discovered in Four-Faith routers, models F3x24 and F3x36, allowing for remote code execution. The vulnerability, located in the /apply.cgi endpoint, can be exploited by manipulating the adj_time_year parameter. This flaw allows attackers to gain reverse shells on vulnerable devices, potentially leading to malware installation, data theft, and significant network disruptions. Over 15,000 devices with default credentials have been identified as being at high risk, emphasizing the urgent need for remediation.

Threat actors are actively exploiting this vulnerability to gain unauthorized access. Users of Four-Faith routers are strongly advised to update their devices to the latest firmware and implement strong password policies immediately. The vulnerability poses a serious threat to industrial networks and critical infrastructure relying on these devices.