First published: Tue Jun 04 2024(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** The improper privilege management vulnerability in the command “show_allsessions” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an authenticated attacker to obtain a logged-in administrator’s session information containing cookies on an affected device.
Credit: security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel NAS326 | <V5.21(AAZF.17)C0 | |
Zyxel NAS542 firmware | <V5.21(ABAG.14)C0 | |
All of | ||
Zyxel NAS326 | <5.21\(aazf.17\)c0 | |
Zyxel NAS326 | ||
All of | ||
Zyxel NAS542 firmware | <5.21\(abag.14\)c0 | |
Zyxel NAS542 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-29976 is considered critical due to improper privilege management that can be exploited by authenticated attackers.
To fix CVE-2024-29976, update Zyxel NAS326 firmware to version V5.21(AAZF.17)C0 or NAS542 firmware to version V5.21(ABAG.14)C0.
CVE-2024-29976 affects Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and Zyxel NAS542 firmware versions before V5.21(ABAG.14)C0.
CVE-2024-29976 cannot be exploited remotely as it requires authenticated access to the affected devices.
If you cannot update your Zyxel NAS devices for CVE-2024-29976, consider disabling remote management features and limiting access to trusted users only.