DETECTION OVERVIEW
Risk Factors
Vulnerable Zyxel products are often accessible from the internet. An attacker can easily exploit this vulnerability with a single malicious packet to install malware and gain control of devices.
Kill Chain
Risk Score
87
Zyxel Networks creates firewall products that include a vulnerability in the Internet Key Exchange (IKEv2) and Internet Security Association and Key Management Protocol (ISAKMP) protocol decoder. This vulnerability improperly handles error messages to enable command injection. To exploit this vulnerability, an attacker creates a specially-designed UDP packet with a malicious command that is injected into the Notification Data field of an IKEv2/ISAKMP error: NO_PROPOSAL_CHOSEN. The attacker sends the packet to the IKEv2/ISAKMP port (500) on the victim. After the victim processes the packet, the malicious command runs on the server with root privileges.