Project Subscriptions
| Vendors | Products |
|---|---|
|
Zyxel
Subscribe
|
Atp100
Subscribe
Atp100 Firmware
Subscribe
Atp200
Subscribe
Atp200 Firmware
Subscribe
Atp500
Subscribe
Atp500 Firmware
Subscribe
Atp800
Subscribe
Atp800 Firmware
Subscribe
Nas326
Subscribe
Nas326 Firmware
Subscribe
Nas520
Subscribe
Nas520 Firmware
Subscribe
Nas540
Subscribe
Nas540 Firmware
Subscribe
Nas542
Subscribe
Nas542 Firmware
Subscribe
Usg110
Subscribe
Usg1100
Subscribe
Usg1100 Firmware
Subscribe
Usg110 Firmware
Subscribe
Usg1900
Subscribe
Usg1900 Firmware
Subscribe
Usg20-vpn
Subscribe
Usg20-vpn Firmware
Subscribe
Usg20w-vpn
Subscribe
Usg20w-vpn Firmware
Subscribe
Usg210
Subscribe
Usg210 Firmware
Subscribe
Usg2200
Subscribe
Usg2200 Firmware
Subscribe
Usg310
Subscribe
Usg310 Firmware
Subscribe
Usg40
Subscribe
Usg40 Firmware
Subscribe
Usg40w
Subscribe
Usg40w Firmware
Subscribe
Usg60
Subscribe
Usg60 Firmware
Subscribe
Usg60w
Subscribe
Usg60w Firmware
Subscribe
Vpn100
Subscribe
Vpn1000
Subscribe
Vpn1000 Firmware
Subscribe
Vpn100 Firmware
Subscribe
Vpn300
Subscribe
Vpn300 Firmware
Subscribe
Vpn50
Subscribe
Vpn50 Firmware
Subscribe
Zywall110
Subscribe
Zywall1100
Subscribe
Zywall1100 Firmware
Subscribe
Zywall110 Firmware
Subscribe
Zywall310
Subscribe
Zywall310 Firmware
Subscribe
|
No advisories yet.
Solution
ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, NAS542, ATP100, ATP200, ATP500, ATP800, USG20-VPN, USG20W-VPN, USG40, USG40W, USG60, USG60W, USG110, USG210, USG310, USG1100, USG1900, USG2200, VPN50, VPN100, VPN300, VPN1000, ZyWALL110, ZyWALL310, and ZyWALL1100 devices.
Workaround
Block access to the ZyXEL device web interface: This issue can be mitigated by blocking (for example with a firewall) access to the web interface (80/tcp and 443/tcp) of any vulnerable ZyXEL device. Any machine that can access the ZyXEL web interface should not also be able to access the internet. Restrict access to vulnerable ZyXEL devices: Direct exploitation of this vulnerability can be mitigated by restricting access to vulnerable devices. In particular, do not expose such devices directly to the internet. Note however, that it is still possible for attackers to exploit devices that are not directly connected to the internet. For example, by way of viewing a web page.
Wed, 22 Oct 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 07 Feb 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-10-21T23:35:50.221Z
Reserved: 2020-02-18T00:00:00.000Z
Link: CVE-2020-9054
Updated: 2024-08-04T10:19:19.559Z
Status : Analyzed
Published: 2020-03-04T20:15:10.750
Modified: 2025-11-10T14:37:04.570
Link: CVE-2020-9054
No data.
OpenCVE Enrichment
No data.