DETECTION OVERVIEW
Risk Factors
Vulnerable Zyxel products are often accessible from the internet. An attacker can easily exploit this vulnerability with a single malicious packet to install malware and gain control of devices.
Category

Zyxel Networks creates firewall products that include a vulnerability in the Internet Key Exchange (IKEv2) and Internet Security Association and Key Management Protocol (ISAKMP) protocol decoder. This vulnerability improperly handles error messages to enable command injection. To exploit this vulnerability, an attacker creates a specially-designed UDP packet with a malicious command that is injected into the Notification Data field of an IKEv2/ISAKMP error: NO_PROPOSAL_CHOSEN. The attacker sends the packet to the IKEv2/ISAKMP port (500) on the victim. After the victim processes the packet, the malicious command runs on the server with root privileges.
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
