Software:ZyNOS
ZyNOS is the proprietary operating system used on network devices made by Zyxel Communications.[1] The name is a contraction of Zyxel and Network Operating System (NOS).
History
Zyxel first introduced ZyNOS in 1998.[2]
Versions
Zyxel released ZyNOS version 4.0 for their GS2200 series 24 and 48 port ethernet switches in April, 2012.[3] It appears that versions differ between Zyxel products.
Access methods
Web and/or command-line interface (CLI) depending on the device. Web access is accomplished by connecting an Ethernet cable between a PC and an open port on the device and entering the IP address of the device into the Web browser.[4] An RS-232 serial console port is provided on some devices for CLI access, which is accomplished by using SSH or telnet.[5]
CLI command types
Listed below are the categories that the CLI commands are grouped by.[6]
- system-related commands
- exit command
- Ethernet-related commands
- WAN-related commands
- WLAN-related commands
- IP-related commands
- PPP-related commands
- bridge-related commands
- RADIUS-related commands
- 802.1x-related commands
- firewall-related commands
- configuration-related commands
- SMT-related commands.
Web Configurator
The Web Configurator is divided into the following categories:[7][4]
- basic settings
- advanced application
- IP application
- management
Security advisories
As of January 2014 a ZyNOS ROM-0 vulnerability has been identified.[8] This vulnerability allowed attacker to download router's configuration (ROM-0 file) without any type of authentication required. Such configuration file can be later decompressed[9][10] to expose router's administrator password, ISP password, wireless password etc.
(As of March 2014), Danish computer security company Secunia reports no unpatched advisories or vulnerabilities on ZyNOS version 4.x.[11]
(As of March 2014), Secunia reports seven advisories and six vulnerabilities on ZyNOS version 3.x. Five advisories are unpatched; Secunia rates the most severe unpatched advisory as less critical.[12]
(As of January 2015), a DNS vulnerability has been found in certain ZyNOS firmware versions. The versions that are affected have not been narrowed down. The attack can be done from a remote location regardless if the user interface is accessible from the outside of a LAN.[13]
References
- ↑ "ZyNOS General FAQ". Zyxeltech.de. http://www.zyxeltech.de/snoteg3000/faq/zynos_faq.htm.
- ↑ "Timeline". http://us.zyxel.com/Corporate/Overview/Timeline.aspx.
- ↑ "ZYXEL LAUNCHES IPv6 UPGRADE FOR BUSINESS SECURITY GATEWAYS AND ETHERNET SWITCHES". http://us.zyxel.com/Corporate/Pressroom/Press-Release.aspx?npid=568.
- ↑ 4.0 4.1 "ZyBook2.book" (PDF). http://ftp2.zyxel.com/XGS4700-48F/user_guide/XGS4700-48F_1.pdf.
- ↑ "Ethernet Switch Reference Guide V3.90 (Nov 2008)" (PDF). http://ftp2.zyxel.com/XGS4700-48F/cli_reference_guide/XGS4700-48F_1.pdf.
- ↑ "ZyNOS CI Command List". Zyxeltech.de. http://www.zyxeltech.de/snotep660hw/ci_cmd/p660hw_ci.htm#SMT.
- ↑ ftp://ftp2.zyxel.com/GS2200-24P/user_guide/GS2200-24P_4.00_ed1.pdf
- ↑ Nasro (2014-01-11). "How I saved your a** from the ZynOS (rom-0) attack !! ( Full disclosure )" (in en). https://rootatnasro.wordpress.com/2014/01/11/how-i-saved-your-a-from-the-zynos-rom-0-attack-full-disclosure/.
- ↑ "ZyNOS ROM-0 DECODER". https://www.piotrbania.com/all/utils/RomDecoder.c.
- ↑ Soo, Jacob (2015-05-12), GitHub - jacobsoo/ROM0_Decoder: Rom0 Decoder., https://github.com/jacobsoo/ROM0_Decoder, retrieved 2019-08-18
- ↑ "ZyXEL ZyNOS 4.x". Secunia. http://secunia.com/advisories/product/6674/.
- ↑ "ZyXEL ZyNOS 3.x". Secunia. http://secunia.com/advisories/product/149/.
- ↑ "DNS hijacking flaw affects D-Link DSL router, possibly other devices". Lucian Constantin. http://www.computerworld.com/article/2876292/dns-hijacking-flaw-affects-d-link-dsl-router-possibly-other-devices.html.
Original source: https://en.wikipedia.org/wiki/ZyNOS.
Read more |