Information disclosure in NETGEAR Routers and WiFi system



Published: 2022-06-30
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID N/A
CWE-ID CWE-200
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
RBR40
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBK22
Hardware solutions / Routers & switches, VoIP, GSM, etc

LBR20
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBK50
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBK40
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBK12
Hardware solutions / Routers & switches, VoIP, GSM, etc

XR450
Hardware solutions / Routers & switches, VoIP, GSM, etc

LBR1020
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBR10
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBR20
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBR50
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBS10
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBS20
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBS40
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBS50
Hardware solutions / Routers & switches, VoIP, GSM, etc

XR500
Hardware solutions / Routers & switches, VoIP, GSM, etc

D7800
Hardware solutions / Routers for home users

R7800
Hardware solutions / Routers for home users

R8900
Hardware solutions / Routers for home users

RAX10
Hardware solutions / Routers for home users

RAX70
Hardware solutions / Routers for home users

RAX120
Hardware solutions / Routers for home users

XR700
Hardware solutions / Routers for home users

R9000
Hardware solutions / Routers for home users

RAX120v2
Hardware solutions / Routers for home users

Vendor

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU64821

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker on the local network can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

RBR40: before 2.7.4.24

RBK22: before 2.7.4.24

D7800: before 1.0.1.64

LBR20: before 2.6.5.32

RBK50: before 2.7.4.24

RBK40: before 2.7.4.24

RBK12: before 2.7.4.24

R7800: before 1.0.2.84

R8900: before 1.0.5.36

RAX10: before 1.0.5.108

RAX70: before 1.0.5.108

RAX120: before 1.2.2.24

XR450: before 2.3.2.130

XR700: before 1.0.1.44

LBR1020: before 2.6.5.16

R9000: before 1.0.5.36

RAX120v2: before 1.2.2.24

RBR10: before 2.7.4.24

RBR20: before 2.7.4.24

RBR50: before 2.7.4.24

RBS10: before 2.7.4.24

RBS20: before 2.7.4.24

RBS40: before 2.7.4.24

RBS50: before 2.7.4.24

XR500: before 2.3.2.130

External links

http://kb.netgear.com/000065039/Security-Advisory-for-Arbitrary-File-Read-on-Some-Routers-and-WiFi-system-PSV-2021-0006


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###