Zenitel Station Firmware Package Vulnerability

CRITICAL (10.0)

Threat Intelligence

Low Risk
EPSS Score: 4.41% chance of exploitation (percentile: 89%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Zenitel Station is a networked, IP-based telephone system used in various industries. The vulnerability exists due to incomplete validation of user-supplied input in the OS command injection mechanism, allowing an unauthenticated attacker to inject arbitrary commands.

Am I affected?

You're affected if you use An OS command. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

  1. Upgrade to a later version of the Station Firmware Package (version 3.2.1 or higher) from the Zenitel website: https://wiki.zenitel.com/wiki/Downloads#Station_and_device_Firmware_Package_.28VS-IS.29
  2. Immediately restrict network access to your Station instance and monitor for suspicious activity.