Zyxel has announced that it will not be releasing patches for two actively exploited zero-day vulnerabilities, CVE-2024-40890 and CVE-2024-40891, affecting multiple legacy DSL CPE products. These vulnerabilities allow attackers to execute arbitrary commands. A Mirai botnet variant is exploiting CVE-2024-40891 in the wild. Zyxel recommends that users replace the end-of-life products with newer-generation devices for optimal protection.
The lack of patches for these exploited vulnerabilities in Zyxel devices poses a significant risk to users who continue to use them. This incident highlights the importance of vendors providing ongoing security support for their products, even after they reach end-of-life.
Zyxel announced it will not patch two actively exploited vulnerabilities (CVE-2024-40890 and CVE-2024-40891) in its legacy DSL CPE products. These vulnerabilities allow for arbitrary command execution, putting users at significant risk. Users of affected devices are strongly advised to replace them immediately. This highlights the challenge of patching legacy hardware and the importance of vendor support for security updates.
Zyxel CPE devices are being actively exploited due to an unpatched vulnerability (CVE-2024-40891). This flaw allows attackers to gain unauthorized access to vulnerable Zyxel devices.
The Cybersecurity and Infrastructure Security Agency (CISA) issued alerts about multiple vulnerabilities being actively exploited in the wild, affecting popular software and hardware products such as Zyxel firewalls, CyberPanel, North Grid, and ProjectSend. These vulnerabilities pose significant security risks, allowing attackers to gain unauthorized access and control of affected systems. Organizations are strongly urged to apply the necessary security updates or mitigations immediately to prevent exploitation. The vulnerabilities include CVE-2024-51378 (CyberPanel), which has a CVSS score of 10.0. Specific details on each vulnerability and remediation steps can be found in the respective security advisories issued by CISA and the affected vendors.