Multiple Vulnerabilities in Netgear products

Original Issue Date: September 10, 2021

Severity Rating: HIGH

Software Affected

The following product models of NETGEAR have been affected:

GC108P

GC108PP

GS108Tv3

GS110TPP

GS110TPv3

GS110TUP

GS308T

GS310TP

GS710TUP

GS716TP

GS716TPP

GS724TPP

GS724TPv2

GS728TPPv2

GS728TPv2

GS750E

GS752TPP

GS752TPv2

MS510TXM

MS510TXUP

Overview

Multiple vulnerabilities have been reported in Netgear Products which an attacker could exploit these vulnerabilities to bypass authentication, disclose sensitive information, bypass security restrictions, gain administrative privileges due to accessing an admin’s password and result in complete compromise of the targeted system.

Description

The vulnerability exists due to improper security restrictions, improper authorization, authentication hijacking, flaw within authentication validation of the UDP protocol of Netgear Smart Control Center and flaw within the Netgear Switch Discovery Protocol (NSDP).

An attacker can send an unauthenticated request to change the admin password of the device resulting in a full compromise of the device which is Netgear Smart Control Center (SCC Control) enabled.

Successful exploitation of these vulnerabilities could allow an attacker to take full control of a vulnerable device, hijack the session bootstrapping information (by having same Admin IP) and bypass authentication, giving the attacker full admin access which result in complete compromise of the targeted system.

Solution

Upgrade to latest versions as mentioned in vendors advisory: https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140- PSV-2021-0144-PSV-2021-0145

Vendor Information

Netgear

https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140- PSV-2021-0144-PSV-2021-0145

Disclaimer

The information provided herein is on “as is” basis, without warranty of any kind.

Leave a Reply