Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Putin proposes Russia and Ukrainian talk directly in Istanbul on May 15 | News of the Russian-Ukrainian War

Founders and Indie Hackers: Are potential buyers find your product at every stage of their search journey?

Tufts University student returns to Boston after being released from Louisiana Detention Center

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » The Zyxel CPE device faces positive exploitation caused by the vulnerability of CVE-2024-40891
Identity

The Zyxel CPE device faces positive exploitation caused by the vulnerability of CVE-2024-40891

userBy userJanuary 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringJanuary 29, 2025LingeringRavy LakshmananVulnerability /network security

Vulnerability under Zyxel

Cyber ​​Security researchers warn that important zero -day vulnerabilities that affect the Zyxel CPE series device are watching wild and positive exploitation.

“The attacker may execute any command on a device affected by this vulnerabilities, and may lead to complete systems, data removal, or network penetration.” Was described in an alert released on Tuesday.

The vulnerability in question is CVE-2024-40891, which is an important command injection vulnerability that has no public disclosure or patch. The existence of the bug was first reported by Vulncheck in July 2024.

Cyber ​​security

The statistics collected by threat intelligence companies indicate that there are dozens of IP addresses of attacks and most of them are in Taiwan. According to Censys, there are more than 1,500 vulnerable devices online.

“CVE-2024-40891 is very similar to CVE-2024-40890, the main difference is that the former is Telnet-based and the latter is HTTP-based,” said GreyNoise. “Either vulnerability allows unrecognized attackers to use a service account to execute any command.”

Vulncheck told Hacker News that it is working through the disclosure process with a Taiwanese company. We contacted Zyxel for further comments, and if we reply, we will update the story.

Vulnerability under Zyxel

In the past, it is recommended that users filter the abnormal HTTP request traffic to the Zyxel CPE management interface and limit access to the reliable IP management interface.

This development reported that ARCTIC WOLF reported the campaign on January 22, 2025, and was accompanied by the acquisition of unauthorized access to devices that are executing SimpleHelp Remote Desktop software as the initial access vector.

It is unknown whether the attack is now related to the exploitation of recently disclosed security defects (CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728). Upload any file with the administrator user.

Cyber ​​security

“The first sign of a compromise was a communication to the SimpleHelp Server instance, which was not approved by the client process,” said security researchers Andres Ramos. “The threat activity also includes the list of accounts and domain information through the CMD.EXE process that started through the Simplehelp session using tools such as the Internet and NLTEST. Session before the attack progresses. Before the end, the threat actor was not observed for the purpose.

The organization strongly recommends updating the SimpleHelp instance to the latest fixed version to ensure potential threats.

update

The company said that there is a clear sign that threat stakeholders are trying to utilize large amounts of vulnerabilities. In addition, some Mirai Botnet Validates have identified the “significant overlap between IP and MIRAI using CVE-2024-40891” and then abuse CVE-2024-40891. I pointed out that it has already been added.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNEXTRACKER (NXT) flies to the profits of stars. What you need to upgrade
Next Article Broadcom warns the flaws of high -sensitivity SQL injection in VMware Avi Load Balancer.
user
  • Website

Related Posts

Google pays $1.375 billion to Texas for fraudulent tracking and collection of biometric data

May 10, 2025

Germany shuts down more than $1.9 billion in laundry, seizing 34 million euros and 8TB of data using crypto

May 10, 2025

Breaking: EOL system dismantled in the US using 7,000 device proxy botnet IoT

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Putin proposes Russia and Ukrainian talk directly in Istanbul on May 15 | News of the Russian-Ukrainian War

Founders and Indie Hackers: Are potential buyers find your product at every stage of their search journey?

Tufts University student returns to Boston after being released from Louisiana Detention Center

Google pays Texas with $1.375 billion in the country’s largest data privacy payment

Trending Posts

Putin proposes Russia and Ukrainian talk directly in Istanbul on May 15 | News of the Russian-Ukrainian War

May 11, 2025

Israeli protesters in Tel Aviv demand end of war with Gaza | Israeli-Palestinian conflict news

May 10, 2025

Mayor Newark denies trespassing at US Immigration Center after arrest | Political News

May 10, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Founders and Indie Hackers: Are potential buyers find your product at every stage of their search journey?

Google pays Texas with $1.375 billion in the country’s largest data privacy payment

Former Northvolt CEO Peter Carlson secures funding for the company’s new AI manufacturing startup after bankruptcy

Celsius founder Alex Masski has been sentenced to 12 years in a crypto fraud that was ordered to pay $48 million

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.