Warning issued over ‘widespread’ exploitation of Zyxel NAS devices
Zyxel has been forced to issue patches for several vulnerabilities affecting NAS devices


Security researchers at two companies have issued warnings over ‘widespread’ exploitation of Zyxel network devices.
Researchers at Rapid7 raised the alarm over the ongoing exploitation of a critical authenticated command injection vulnerability, tracked as CVE-2023-28771, that was found to affect multiple Zyxel devices.
The flaw was present in the default confirmation of vulnerable devices, Rapid7 found, and exploitable via Zyxel’s Wide Area Network (WAN) interface.
Zyxel researchers explained this is “intended to be exposed to the internet”, and that a VPN would not need to be configured on a targeted device for it to be at risk.
RELATED RESOURCE
Beat cyber criminals at their own game
A guide to winning the vulnerability race and protection your organization
Successful exploitation of the vulnerability would allow an attacker to remotely execute code on a target system by sending a “specially crafted IKEv2 packet” to UDP port 500 on the device, researchers said.
Zyxel released an advisory for CVE-2023-28771 on 25 April. The US Cybersecurity and Infrastructure Agency (CISA) has since added the flaw to its known exploited vulnerabilities list and warned organizations to remain vigilant.
Technical analysis from Rapid7 found that it was being “widely exploited and that compromised Zyxel devices were being leveraged to conduct downstream attacks as part of a Mirai-based botnet”.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“As of May 19, there were at least 42,000 instances of Zyxel devices on the public internet. However, this number only includes devices that expose their web interfaces on the WAN, which is not a default setting,” researchers noted.
“Since the vulnerability is in the VPN service, which is enabled by default on the WAN, we expect the actual number of exposed and vulnerable devices to be much higher.”
Additional Zyxel vulnerabilities disclosed
Zyxel has also issued a patch for a security vulnerability affecting owners of its Linux-operated NAS326, NAS540, and NAS542 storage devices running the latest firmware.
These Zyxel NAS appliances allow for the storage of user data in a single location, including cloud data, photos, videos, or USB data, according to researchers at Sternum.
In an advisory, the firm said researchers were “in the process of scanning one of the Zyxel NAS units” and uncovered the flaw when a “Dangerous String Format” alert was triggered.
“In this situation, there was a problem with a ntpdate_date process, which, as the name suggests, is responsible for periodically synchronizing the device’s internal clock via NTP pings,” researchers explained.
“Knowing that it was passed as a string to ntpdate_date, Sternum researchers investigated further to see if it could be used to manipulate the device.”
Analysis revealed the flaw that could be used by an unauthenticated user to "execute an arbitrary system command with root privileges on the system”.
This could be used for more malicious purposes, Sternum added, such as remote malware injection.
Zyxel acknowledged the vulnerability and issued a patch and CVE notice on 30 May.

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
Netgear WBE710 review
Reviews The compact WBE710 delivers great cloud management features and a good turn of Wi-Fi 7 speed – but it does have a premium price tag
By Dave Mitchell Published
-
Businesses are taking their eye off the ball with vulnerability patching
News Security leaders are overconfident in their organization’s security posture while allowing vulnerability patching to fall by the wayside.
By Jane McCallion Published
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott Published
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
By Solomon Klappholz Published
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
By Emma Woollacott Published
-
T-Mobile security chief insists its defenses stood up to attacks linked to Salt Typhoon
News No T-Mobile customers or services were affected after its security teams detected suspicious activity on their routers
By Solomon Klappholz Published
-
Securing your network in every direction with zero trust
Whitepaper Webinar on the evolution of network security
By ITPro Published
-
Turning your log and incident data into real-time security insights
Whitepaper Integrate multiple data sources for a comprehensive security view
By ITPro Published
-
Do more with less: Optimizing servers with HPE to maximize VMware licensing
Whitepaper Your trusted guide through the changes in the virtualization market
By ITPro Published
-
Modern enterprise cybersecurity
whitepaper Cultivating resilience with reduced detection and response times
By ITPro Published