Multiple vulnerabilities in NETGEAR Touters



Published: 2018-02-09
Risk Low
Patch available YES
Number of vulnerabilities 5
CVE-ID N/A
CWE-ID CWE-200
CWE-78
CWE-264
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
D8500
Hardware solutions / Routers for home users

WNDR4500v2
Hardware solutions / Routers for home users

R7000P
Hardware solutions / Routers for home users

R6400v2
Hardware solutions / Routers for home users

R6300v2
Hardware solutions / Routers for home users

DGN2200v4
Hardware solutions / Routers for home users

R6400
Hardware solutions / Routers for home users

R6700
Hardware solutions / Routers for home users

R7000
Hardware solutions / Routers for home users

R6100
Hardware solutions / Routers for home users

R8300
Hardware solutions / Routers for home users

R8500
Hardware solutions / Routers for home users

D6220
Hardware solutions / Routers for home users

R6900P
Hardware solutions / Routers for home users

R6250
Hardware solutions / Routers for home users

D6400
Hardware solutions / Routers for home users

R6900
Hardware solutions / Routers for home users

R7100LG
Hardware solutions / Routers for home users

R7300DST
Hardware solutions / Routers for home users

R7900
Hardware solutions / Routers for home users

R8000
Hardware solutions / Routers for home users

D7800
Hardware solutions / Routers for home users

EX6200v2
Hardware solutions / Routers for home users

R7800
Hardware solutions / Routers for home users

R7500v2
Hardware solutions / Routers for home users

R7500
Hardware solutions / Routers for home users

Vendor NETGEAR

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Information disclosure

EUVDB-ID: #VU10433

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw in the genie_restoring.cgi script, provided by the box's built-in web server. An adjacent attacker can abuse the vulnerable script and extract files and passwords from its filesystem in flash storage or pull files from USB sticks plugged into the router.

Mitigation

Update to the latest version.

Vulnerable software versions

D8500: All versions

WNDR4500v2: All versions

R7000P: All versions

R6400v2: All versions

R6300v2: All versions

DGN2200v4: All versions

R6400: All versions

R6700: All versions

: All versions

R7000: All versions

: All versions

: All versions

: All versions

: All versions

: All versions

: All versions

: All versions

External links

http://kb.netgear.com/000045848/Security-Advisory-for-Password-Recovery-and-File-Access-on-Some-Rou...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) OS command injection

EUVDB-ID: #VU10434

Risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows an local root-privileged attacker to execute shell commands on the target system.

The weakness exists due to post-authentication command injection. A local attacker can use the device_name parameter on the lan.cgi page to inject and execute arbitrary commands with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update to the latest version.

Vulnerable software versions

D8500: All versions

R6100: All versions

R6400v2: All versions

R6400: All versions

R8300: All versions

R8500: All versions

External links

http://kb.netgear.com/000045850/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Modem-Routers-PSV-2017-1207


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Authentication bypass

EUVDB-ID: #VU10436

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to bypass authentication on the target system.

The weakness exists due to improper privileges and access controls. A local attacker can bypass authentication if "&genie=1" is found within the query string.

Mitigation

Update to the latest version.

Vulnerable software versions

D6220: All versions

: All versions

: All versions

R6400: All versions

R6400v2: All versions

: All versions

: All versions

R7000P: All versions

R7000: All versions

: All versions

: All versions

: All versions

: All versions

: All versions

: All versions

R6900P: All versions

R6250: All versions

External links

http://kb.netgear.com/000048998/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-or-Mode...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) OS command injection

EUVDB-ID: #VU10438

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows an local attacker to execute shell commands on the target system.

The weakness exists due to command injection. A local attacker can use the device_name parameter on the lan.cgi page to inject and execute arbitrary commands with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update to the latest version.

Vulnerable software versions

D6220: All versions

D8500: All versions

D6400: All versions

R6250: All versions

R6400: All versions

R6400v2: All versions

R6700: All versions

R6900P: All versions

R6900: All versions

R7000P: All versions

R7000: All versions

R7100LG: All versions

R7300DST: All versions

R7900: All versions

R8000: All versions

R8300: All versions

R8500: All versions

External links

http://kb.netgear.com/000048999/Security-Advisory-for-Command-Injection-on-Some-Routers-and-Modem-R...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) OS command injection

EUVDB-ID: #VU10440

Risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows an local root-privileged attacker to execute shell commands on the target system.

The weakness exists due to post-authentication command injection. A local attacker can inject and execute arbitrary commands with root privileges during short time window when WPS is activated.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Update to the latest version.

Vulnerable software versions

R6100: All versions

D7800: All versions

EX6200v2: All versions

R7800: All versions

R7500v2: All versions

R7500: All versions

External links

http://kb.netgear.com/000049354/Security-Advisory-for-Command-Injection-Vulnerability-on-D7000-EX6200v2-and-Some-Routers-PSV-2017-2181


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###