Original Issue Date: September 10, 2021
Severity Rating: HIGH
Software Affected
The following product models of NETGEAR have been affected:
GC108P
GC108PP
GS108Tv3
GS110TPP
GS110TPv3
GS110TUP
GS308T
GS310TP
GS710TUP
GS716TP
GS716TPP
GS724TPP
GS724TPv2
GS728TPPv2
GS728TPv2
GS750E
GS752TPP
GS752TPv2
MS510TXM
MS510TXUP
Overview
Multiple vulnerabilities have been reported in Netgear Products which an attacker could exploit these vulnerabilities to bypass authentication, disclose sensitive information, bypass security restrictions, gain administrative privileges due to accessing an admin’s password and result in complete compromise of the targeted system.
Description
The vulnerability exists due to improper security restrictions, improper authorization, authentication hijacking, flaw within authentication validation of the UDP protocol of Netgear Smart Control Center and flaw within the Netgear Switch Discovery Protocol (NSDP).
An attacker can send an unauthenticated request to change the admin password of the device resulting in a full compromise of the device which is Netgear Smart Control Center (SCC Control) enabled.
Successful exploitation of these vulnerabilities could allow an attacker to take full control of a vulnerable device, hijack the session bootstrapping information (by having same Admin IP) and bypass authentication, giving the attacker full admin access which result in complete compromise of the targeted system.
Solution
Upgrade to latest versions as mentioned in vendors advisory: https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140- PSV-2021-0144-PSV-2021-0145
Vendor Information
Netgear
Disclaimer
The information provided herein is on “as is” basis, without warranty of any kind.