Zyxel USG FLEX H Series Firewall 1.20 < 1.32 Privilege Escalation

high Nessus Plugin ID 237021

Synopsis

The remote security gateway is affected by multiple privilege escalation vulnerabilities.

Description

Firmware version of the Zyxel USG is less than uOS 1.32. This means the Zyxel device is vulnerable to mualtiple privilege escalation vulnerability. The incorrect permission assignment vulnerability in the PostgreSQL commands of certain USG FLEX H series uOS firmware versions could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token. Note that modifying the system configuration is only possible if the administrator has not logged out and the token remains valid.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Zyxel USG uOS 1.32 or later.

See Also

http://www.nessus.org/u?a10e5b38

Plugin Details

Severity: High

ID: 237021

File Name: zyxel_usg_cve-2025-1731.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 5/21/2025

Updated: 5/21/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-1731

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/h:zyxel:usg_flex

Required KB Items: installed_sw/Zyxel Unified Security Gateway (USG)

Patch Publication Date: 4/22/2025

Vulnerability Publication Date: 4/22/2025

Reference Information

CVE: CVE-2025-1731

IAVA: 2025-A-0295