
Zyxel has released patches to address security vulnerabilities in its USG FLEX H series firewalls, urging users to install them for optimal protection. The vulnerabilities involve incorrect permission assignment and improper privilege management, potentially allowing attackers to gain unauthorized access and escalate privileges.
The advisory details two key vulnerabilities:
- CVE-2025-1731: This incorrect permission assignment vulnerability affects the PostgreSQL commands in certain USG FLEX H series UOS firmware versions. It could allow a local attacker with low privileges to gain access to the Linux shell and escalate their privileges. This could be achieved “by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token“. However, the advisory notes a caveat: “modifying the system configuration is only possible if the administrator has not logged out and the token remains valid“. The CVSS score for this vulnerability is 7.8.
- CVE-2025-1732: This improper privilege management vulnerability exists in the recovery function of certain USG FLEX H series UOS firmware versions. An authenticated local attacker with administrator privileges could exploit this to “upload a crafted configuration file and escalate privileges on a vulnerable device“. The CVSS score for this vulnerability is 6.7.
The affected firmware versions and the corresponding patch availability are as follows:
- Affected: USG FLEX H UOS V1.20 to V1.31
- Patch: UOS V1.32
Zyxel strongly advises users of the affected USG FLEX H series firewalls to install the provided patches to mitigate these vulnerabilities and ensure the security of their systems.