Patch comes amid active exploitation by ransomware gangs
Networking hardware vendor ZyxelÂ today released an update to fix a critical flaw in many of its network attached storage (NAS) devices that can be used to remotely commandeer them. The patch comes 12 days after KrebsOnSecurity alerted the company that precise instructions for exploiting the vulnerability were being sold for $20,000 in the cybercrime underground.
Based in Taiwan, Zyxel Communications Corp.Â (a.k.a âZyXELâ) is a maker of networking devices, including Wi-Fi routers, NAS products and hardware firewalls. The company has roughly 1,500 employees and boasts some 100 million devices deployed worldwide. While in many respects the class of vulnerability addressed in this story is depressingly common among Internet of Things (IoT) devices, the flaw is notable because it has attracted the interest of groups specializing in deploying ransomware at scale.
KrebsOnSecurity first learned about the flaw on Feb. 12 from Alex Holden, founder of Milwaukee-based security firm Hold Security. Holden had obtained a copy of the exploit code, which allows an attacker to remotely compromise more than a dozen types of Zyxel NAS products remotely without any help from users.
A snippet from the documentation provided by 500mhz for the Zyxel 0day.
Holden said the seller of the exploit code â a neâer-do-well who goes by the nickname â500mhzâ âis known for being reliable and thorough in his sales of 0day exploits (a.k.a. âzero-days,â these are vulnerabilities in hardware or software products that vendors first learn about when exploit code and/or active exploitation shows up online).
For example, this and previous zero-days for sale by 500mhz came with exhaustive documentation detailing virtually everything about the flaw, including any preconditions needed to exploit it, step-by-step configuration instructions, tips on how to remove traces of exploitation, and example search links that could be used to readily locate thousands of vulnerable devices.
500mhzâs profile on one cybercrime forum states that he is constantly buying, selling and trading various 0day vulnerabilities.
âIn some cases, it is possible to exchange your 0day with my existing 0day, or sell mine,â his Russian-language profile reads.
The profile page of 500mhz, translated from Russian to English via Google Chrome.
KrebsOnSecurity first contacted Zyxel on Feb. 12, sharing a copy of the exploit code and description of the vulnerability. When four days elapsed without any response from the vendor to notifications sent via multiple methods, this author shared the same information with vulnerability analysts at the U.S. Department of Homeland Security (DHS) and with the CERT Coordination Center (CERT/CC), a partnership between DHS and Carnegie Mellon University.
Less than 24 hours after contacting DHS and CERT/CC, KrebsOnSecurity heard back from Zyxel, which thanked KrebsOnSecurity for the alert without acknowledging its failure to respond until they were sent the same information by others.
âThanks for flagging,â Zyxelâs team wrote on Feb. 17. âWeâve just received an alert of the same vulnerabilities from US-CERT over the weekend, and weâre now in the process of investigating. Still, we heartilyÂ appreciate you bringing it to our attention.â
Earlier today, Zyxel sent a message saying it had published a security advisory and patch for the zero-day exploit in some of its affected products. The vulnerable devices includeÂ NAS542, NAS540, NAS520, NAS326, NSA325 v2, NSA325, NSA320S, NSA320, NSA310S, NSA310, NSA221, NSA220+, NSA220, and NSA210. The flaw is designated as CVE-2020-9054.
However, many of these devices are no longer supported by Zyxel and will not be patched. Zyxelâs advice for those users is simply âdo not leave the product directly exposed to the internet.â
âIf possible, connect it to a security router or firewall for additional protection,â the advisory reads.
Holden said given the simplicity of the exploit â which allows an attacker to seize remote control over an affected device by injecting just two characters to the username field of the login panel for Zyxel NAS devices â itâs likely other Zyxel products may have related vulnerabilities.
âConsidering how stupid this exploit is, Iâm guessing this is not the only one of its class in their products,â he said.
CERTâs advisory on the flaw rates it at a â10â â its most severe. The advisory includes additional mitigation instructions, including a proof-of-concept exploit that has the ability to power down affected Zyxel devices.
EMOTET GOES IOT?
Holden saidÂ recent activity suggests that attackers known for deploying ransomware have been actively working to test the zero-day for use against targets. Specifically, Holden said the exploit is now being used by a group of bad guys who are seeking to fold the exploit into Emotet, a powerful malware tool typically disseminated via spam that is frequently used to seed a target with malcode which holds the victimâs files for ransom.
Holden said 500mhz was offering the Zyxel exploit for $20,000 on cybercrime forums, although itâs not clear whether the Emotet gang paid anywhere near that amount for access to the code. Still, he said, ransomware gangs could easily earn back their investment by successfully compromising a single target with this simple but highly reliable exploit.
âFrom the attackerâs standpoint simple is better,â he said. âThe commercial value of this exploit was set at $20,000, but thatâs not much when you consider a ransomware gang could easily make that money back and then some in a short period of time.â
Emotetâs nascent forays into IoT come amid other disturbing developments for the prolific exploitation platform. Earlier this month, security researchers noted that Emotet now has the capability to spread in a worm-like fashion via Wi-Fi networks.
âTo me, a 0day exploit in Zyxel is not as scary as who bought it,â he said. âThe Emotet guys have been historically targeting PCs, laptops and servers, but their venture now into IoT devices is very disturbing.â
This experience was a good reminder that vulnerability reporting and remediation often can be a frustrating process. Twelve days turnaround is fairly quick as these things go, although probably not quick enough for customers using products affected by zero-day vulnerabilities.
It can be tempting when one is not getting any response from a vendor to simply publish an alert detailing oneâs findings, and the pressure to do so certainly increases when there is a zero-day flaw involved. KrebsOnSecurity ultimately opted not to do that for three reasons.
Firstly, at the time there was no evidence that the flaws were being actively exploited, and because the vendor had assured DHS and CERT-CC that it would soon have a patch available.
Perhaps most importantly, public disclosure of an unpatched flaw could well have made a bad situation worse, without offering affected users much in the way of information about how to protect their systems.
Many hardware and software vendors include a link from their home pages to /security.txt, which is a proposed standard for allowing security researchers to quickly identify the points of contact at vendors when seeking to report security vulnerabilities. But even vendors who havenât yet adopted this standard (Zyxel has not) usually will respond to reports at security@[vendordomainhere]; indeed, Zyxel encourages researchers to forward any such reports to firstname.lastname@example.org.
On the subject of full disclosure, I should note that while this author is listed by Hold Securityâs site as an advisor, KrebsOnSecurity has never sought nor received remuneration of any kind in connection with this role.