Jan 28, 2025 • GreyNoise Blog
Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)
Cybersecurity researchers have identified active exploitation of a critical zero-day vulnerability, tracked as CVE-2024-40891, affecting Zyxel Customer...
Executive Summary
Cybersecurity researchers have identified active exploitation of a critical zero-day vulnerability, tracked as CVE-2024-40891, affecting Zyxel Customer Premises Equipment (CPE) devices. This flaw enables telnet-based command injection, allowing unauthorized attackers to execute arbitrary commands on vulnerable systems. Currently, over 1,500 exposed systems are believed to be impacted by this campaign. The severity is elevated due to the absence of an available vendor patch, leaving organizations without an immediate remediation path. Threat actors are actively scanning and compromising devices to establish footholds. Mitigation strategies currently rely on network segmentation, disabling telnet services where possible, and restricting external access to management interfaces until an official fix is released. Continuous monitoring for suspicious outbound traffic and unauthorized configuration changes is strongly advised to detect potential compromise attempts targeting this unpatched vulnerability in Zyxel infrastructure.
Summary
CVE-2024-40891: Zyxel CPE Zero-day Exploitation. Hackers are actively exploiting a telnet-based command injection vulnerability in Zyxel CPE devices, impacting 1,500+ exposed systems. No patch is available yet.
Published Analysis
Cybersecurity researchers have identified active exploitation of a critical zero-day vulnerability, tracked as CVE-2024-40891, affecting Zyxel Customer Premises Equipment (CPE) devices. This flaw enables telnet-based command injection, allowing unauthorized attackers to execute arbitrary commands on vulnerable systems. Currently, over 1,500 exposed systems are believed to be impacted by this campaign. The severity is elevated due to the absence of an available vendor patch, leaving organizations without an immediate remediation path. Threat actors are actively scanning and compromising devices to establish footholds. Mitigation strategies currently rely on network segmentation, disabling telnet services where possible, and restricting external access to management interfaces until an official fix is released. Continuous monitoring for suspicious outbound traffic and unauthorized configuration changes is strongly advised to detect potential compromise attempts targeting this unpatched vulnerability in Zyxel infrastructure. CVE-2024-40891: Zyxel CPE Zero-day Exploitation. Hackers are actively exploiting a telnet-based command injection vulnerability in Zyxel CPE devices, impacting 1,500+ exposed systems. No patch is available yet. CVE-2024-40891: Zyxel CPE Zero-day Exploitation. Hackers are actively exploiting a telnet-based command injection vulnerability in Zyxel CPE devices, impacting 1,500+ exposed systems. No patch is available yet.
Linked Entities
- CVE-2024-40891