

Tracked as CVE-2016-10401, Zyxel devices released at the time contained a secret backdoor mechanism that allowed anyone to elevate any account on a Zyxel device to root level using the " zyad5001" SU (super-user) password. In an interview with ZDNet this week, IoT security researcher Ankit Anubhav said that Zyxel should have learned its lesson from a previous incident that took place in 2016. Zyxel should have learned from the 2016 backdoor incident
Ftp zyxel firmware install#
Researchers said the account had root access to the device because it was being used to install firmware updates to other interconnected Zyxel devices via FTP.
Ftp zyxel firmware password#
"The plaintext password was visible in one of the binaries on the system," the Dutch researchers said in a report published before the Christmas 2020 holiday. Installing patches removes the backdoor account, which, according to Eye Control researchers, uses the " zyfwp" username and the " PrOw!aN_fXp" password. Patches for the NXC series are expected in April 2021, according to a Zyxel security advisory. Patches are currently available only for the ATP, USG, USG Flex, and VPN series.

Many of these devices are used at the edge of a company's network and, once compromised, allow attackers to pivot and launch further attacks against internal hosts.

Ftp zyxel firmware update#
The backdoor account, discovered by a team of Dutch security researchers from Eye Control, is considered as bad as it gets in terms of vulnerabilities.ĭevice owners are advised to update systems as soon as time permits. Learn how and why it is finally changing. The technology world has spent so much of the past two decades focused on innovation that security has often been an afterthought. We review Apple's M1 Ultra-powered Mac StudioĬan digital dollars be as anonymous as cash? Ukrainian developers share stories from the war zone When the boss gets angry at employees' Teams habits
