ZyNOS

The topic of ZyNOS is of utmost importance today, since it has generated a great impact in different areas of society. Since its inception, ZyNOS has aroused the interest of experts and scholars, who have dedicated their time and effort to analyzing its implications and consequences. Over time, ZyNOS has evolved and adapted to the new needs and demands of society, becoming a relevant topic today. In this article, we will analyze ZyNOS in depth and its impact in different areas, offering a complete and updated overview of this very relevant topic.

ZyNOS is the proprietary operating system used on network devices made by Zyxel Communications.[1] The name is a contraction of Zyxel and Network Operating System (NOS).

History

Zyxel first introduced ZyNOS in 1998.[2]

Versions

Zyxel released ZyNOS version 4.0 for their GS2200 series 24 and 48 port ethernet switches in April, 2012.[3] It appears that versions differ between Zyxel products.

Access methods

Web and/or command-line interface (CLI) depending on the device. Web access is accomplished by connecting an Ethernet cable between a PC and an open port on the device and entering the IP address of the device into the Web browser.[4] An RS-232 serial console port is provided on some devices for CLI access, which is accomplished by using SSH or telnet.[5]

CLI command types

Listed below are the categories that the CLI commands are grouped by.[6]

  • system-related commands
  • exit command
  • Ethernet-related commands
  • WAN-related commands
  • WLAN-related commands
  • IP-related commands
  • PPP-related commands
  • bridge-related commands
  • RADIUS-related commands
  • 802.1x-related commands
  • firewall-related commands
  • configuration-related commands
  • SMT-related commands.

Web Configurator

The Web Configurator is divided into the following categories:[7][4]

  • basic settings
  • advanced application
  • IP application
  • management

Security advisories

As of January 2014 a ZyNOS ROM-0 vulnerability has been identified.[8] This vulnerability allowed attacker to download router's configuration (ROM-0 file) without any type of authentication required. Such configuration file can be later decompressed[9][10] to expose router's administrator password, ISP password, wireless password etc.

As of March 2014, Danish computer security company Secunia reports no unpatched advisories or vulnerabilities on ZyNOS version 4.x.[11]

As of March 2014, Secunia reports seven advisories and six vulnerabilities on ZyNOS version 3.x. Five advisories are unpatched; Secunia rates the most severe unpatched advisory as less critical.[12]

As of January 2015, a DNS vulnerability has been found in certain ZyNOS firmware versions. The versions that are affected have not been narrowed down. The attack can be done from a remote location regardless if the user interface is accessible from the outside of a LAN.[13]

References

  1. ^ Tseng, Mickey. "ZyNOS General FAQ". Zyxeltech.de. Retrieved 2014-03-07.
  2. ^ "Timeline". Archived from the original on 2012-05-31. Retrieved 2012-06-06.
  3. ^ "ZYXEL LAUNCHES IPv6 UPGRADE FOR BUSINESS SECURITY GATEWAYS AND ETHERNET SWITCHES". Archived from the original on 2012-05-12. Retrieved 2012-06-06.
  4. ^ a b "ZyBook2.book" (PDF). Retrieved 2014-03-07.
  5. ^ "Ethernet Switch Reference Guide V3.90 (Nov 2008)" (PDF). Retrieved 2014-03-07.
  6. ^ Tseng, Mickey. "ZyNOS CI Command List". Zyxeltech.de. Retrieved 2014-03-07.
  7. ^ ftp://ftp2.zyxel.com/GS2200-24P/user_guide/GS2200-24P_4.00_ed1.pdf
  8. ^ Nasro (2014-01-11). "How I saved your a** from the ZynOS (rom-0) attack !! ( Full disclosure )". root@Nasro. Retrieved 2019-08-18.
  9. ^ "ZyNOS ROM-0 DECODER".
  10. ^ Soo, Jacob (2015-05-12), GitHub - jacobsoo/ROM0_Decoder: Rom0 Decoder., retrieved 2019-08-18
  11. ^ "ZyXEL ZyNOS 4.x". Secunia. Retrieved 2014-03-07.
  12. ^ "ZyXEL ZyNOS 3.x". Secunia. Retrieved 2014-03-07.
  13. ^ "DNS hijacking flaw affects D-Link DSL router, possibly other devices". Lucian Constantin. Retrieved 2015-01-30.