Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Federal judge extends order blocking Trump administration’s ban on foreign Harvard students

Trump’s tariffs are ruled illegal: Will this make the United States trade in war? |Trade War News

Ten years later, the bootstrap Thinkst Canary will reach $20 million ARR without VC funding

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » The Zyxel CPE device faces positive exploitation caused by the vulnerability of CVE-2024-40891
Identity

The Zyxel CPE device faces positive exploitation caused by the vulnerability of CVE-2024-40891

userBy userJanuary 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringJanuary 29, 2025LingeringRavy LakshmananVulnerability /network security

Vulnerability under Zyxel

Cyber ​​Security researchers warn that important zero -day vulnerabilities that affect the Zyxel CPE series device are watching wild and positive exploitation.

“The attacker may execute any command on a device affected by this vulnerabilities, and may lead to complete systems, data removal, or network penetration.” Was described in an alert released on Tuesday.

The vulnerability in question is CVE-2024-40891, which is an important command injection vulnerability that has no public disclosure or patch. The existence of the bug was first reported by Vulncheck in July 2024.

Cyber ​​security

The statistics collected by threat intelligence companies indicate that there are dozens of IP addresses of attacks and most of them are in Taiwan. According to Censys, there are more than 1,500 vulnerable devices online.

“CVE-2024-40891 is very similar to CVE-2024-40890, the main difference is that the former is Telnet-based and the latter is HTTP-based,” said GreyNoise. “Either vulnerability allows unrecognized attackers to use a service account to execute any command.”

Vulncheck told Hacker News that it is working through the disclosure process with a Taiwanese company. We contacted Zyxel for further comments, and if we reply, we will update the story.

Vulnerability under Zyxel

In the past, it is recommended that users filter the abnormal HTTP request traffic to the Zyxel CPE management interface and limit access to the reliable IP management interface.

This development reported that ARCTIC WOLF reported the campaign on January 22, 2025, and was accompanied by the acquisition of unauthorized access to devices that are executing SimpleHelp Remote Desktop software as the initial access vector.

It is unknown whether the attack is now related to the exploitation of recently disclosed security defects (CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728). Upload any file with the administrator user.

Cyber ​​security

“The first sign of a compromise was a communication to the SimpleHelp Server instance, which was not approved by the client process,” said security researchers Andres Ramos. “The threat activity also includes the list of accounts and domain information through the CMD.EXE process that started through the Simplehelp session using tools such as the Internet and NLTEST. Session before the attack progresses. Before the end, the threat actor was not observed for the purpose.

The organization strongly recommends updating the SimpleHelp instance to the latest fixed version to ensure potential threats.

update

The company said that there is a clear sign that threat stakeholders are trying to utilize large amounts of vulnerabilities. In addition, some Mirai Botnet Validates have identified the “significant overlap between IP and MIRAI using CVE-2024-40891” and then abuse CVE-2024-40891. I pointed out that it has already been added.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNEXTRACKER (NXT) flies to the profits of stars. What you need to upgrade
Next Article Broadcom warns the flaws of high -sensitivity SQL injection in VMware Avi Load Balancer.
user
  • Website

Related Posts

New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers

May 29, 2025

Dragonforce exploits SimpleHelp flaws to deploy ransomware across customer endpoints

May 29, 2025

China’s APT41 misuses Google Calendar for malware command and control operations

May 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Federal judge extends order blocking Trump administration’s ban on foreign Harvard students

Trump’s tariffs are ruled illegal: Will this make the United States trade in war? |Trade War News

Ten years later, the bootstrap Thinkst Canary will reach $20 million ARR without VC funding

New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers

Trending Posts

Trump’s tariffs are ruled illegal: Will this make the United States trade in war? |Trade War News

May 29, 2025

Syrians return to villages destroyed by war | Syrian war news

May 29, 2025

How Gaza’s Distribution Disruption unfolds: Visual Guide | Israeli-Palestinian Conflict News

May 29, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Deepseek quietly releases the upgraded R1 AI model and escalates competition with Openai

Fullscreen BITM Attack Discovered by Squarex Exploits Browser Fullscreen API steals Safari Credentials

BET20 launches premium casino platforms with trusted licenses, instant crypto withdrawals and elite games

Reddio’s Exclusive Token Generation Event (TGE) and Alpha Trading in Binance Wallet – May 29, 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.