First published: Fri Jul 02 2021(Updated: )
An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to execute arbitrary commands on an affected device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel USG1900 Firmware | >=4.35<=4.64 | |
Zyxel USG1900 Firmware | ||
Zyxel USG 1100 firmware | >=4.35<=4.64 | |
Zyxel USG1100 firmware | ||
Zyxel USG 310 firmware | >=4.35<=4.64 | |
Zyxel USG 310 | ||
Zyxel USG210 Firmware | >=4.35<=4.64 | |
Zyxel USG210 Firmware | ||
Zyxel USG 110 Firmware | >=4.35<=4.64 | |
Zyxel USG 110 | ||
Zyxel USG 40 firmware | >=4.35<=4.64 | |
Zyxel USG 40 | ||
Zyxel USG 40w firmware | >=4.35<=4.64 | |
Zyxel USG 40w firmware | ||
Zyxel USG 60W firmware | >=4.35<=4.64 | |
Zyxel USG 60 | ||
Zyxel USG 60W firmware | >=4.35<=4.64 | |
Zyxel USG 60W firmware | ||
Zyxel USG300 Firmware | >=4.35<=4.64 | |
Zyxel USG300 Firmware | ||
Zyxel USG1000 | >=4.35<=4.64 | |
Zyxel USG1000 | ||
Zyxel USG2000 Firmware | >=4.35<=4.64 | |
Zyxel USG2000 Firmware | ||
Zyxel USG20-VPN Firmware | >=4.35<=4.64 | |
Zyxel USG20 Firmware | ||
Zyxel USG 20W | >=4.35<=4.64 | |
Zyxel USG 20W | ||
Zyxel USG50 Firmware | >=4.35<=4.64 | |
Zyxel USG50 Firmware | ||
Zyxel ZyWALL USG 100 firmware | >=4.35<=4.64 | |
Zyxel USG100 Firmware | ||
Zyxel USG200 Firmware | >=4.35<=4.64 | |
Zyxel USG200 Firmware | ||
Zyxel USG Flex 100 firmware | >=4.35<=5.01 | |
Zyxel USG Flex 100 firmware | ||
Zyxel USG FLEX firmware | >=4.35<=5.01 | |
Zyxel USG FLEX 200 firmware | ||
Zyxel USG FLEX firmware | >=4.35<=5.01 | |
Zyxel USG FLEX 500 firmware | ||
Zyxel USG FLEX 100w firmware | >=4.35<=5.01 | |
Zyxel USG FLEX 100w firmware | ||
Zyxel USG FLEX firmware | >=4.35<=5.01 | |
Zyxel USG FLEX 700 firmware | ||
Zyxel Zywall ATP100W Firmware | >=4.35<=5.01 | |
Zyxel ZyWall ATP100 Firmware | ||
Zyxel ATP100W Firmware | >=4.35<=5.01 | |
Zyxel Zywall ATP100W Firmware | ||
Zyxel Zywall ATP200 | >=4.35<=5.01 | |
Zyxel Zywall ATP200 | ||
Zyxel ATP500 Firmware | >=4.35<=5.01 | |
Zyxel ATP500 Firmware | ||
Zyxel ATP700 Firmware | >=4.35<=5.01 | |
Zyxel ATP700 Firmware | ||
Zyxel ATP800 | >=4.35<=5.01 | |
Zyxel Zywall ATP800 Firmware | ||
Zyxel Zywall VPN 50 Firmware | >=4.35<=5.01 | |
Zyxel Zywall VPN 50 Firmware | ||
Zyxel Zywall VPN 100 | >=4.35<=5.01 | |
Zyxel Zywall VPN 100 | ||
Zyxel Zywall VPN 300 Firmware | >=4.35<=5.01 | |
Zyxel Zywall VPN 300 | ||
Zyxel USG20W-VPN Firmware | >=4.35<=5.01 | |
Zyxel USG20W-VPN Firmware | ||
Zyxel USG 20W-VPN Firmware | >=4.35<=5.01 | |
Zyxel USG20W-VPN Firmware | ||
Zyxel USG2200-VPN Firmware | >=4.35<=5.01 | |
Zyxel USG2200-VPN Firmware | ||
Zyxel Zywall 1100 Firmware | >=4.35<=5.01 | |
Zyxel Zywall 110 firmware | ||
Zyxel ZyWALL USG 310 firmware | >=4.35<=5.01 | |
Zyxel Zywall 310 Firmware | ||
Zyxel Zywall 1100 Firmware | >=4.35<=5.01 | |
Zyxel Zywall 1100 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35029 is classified as a critical authentication bypass vulnerability.
To mitigate CVE-2021-35029, users should update their Zyxel devices to the latest firmware version that addresses the vulnerability.
CVE-2021-35029 affects various Zyxel USG and Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01.
Yes, CVE-2021-35029 allows remote attackers to execute arbitrary commands on affected devices.
Yes, CVE-2021-35029 has been reported to be actively exploited, making prompt remediation essential.