#VU74011 Hidden functionality in Hardware solutions


Published: 2023-03-24

Vulnerability identifier: #VU74011

Vulnerability risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-36429

CWE-ID: CWE-912

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
RBR750
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBR840
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBR850
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBRE950
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBRE960
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBS750
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBS840
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBS850
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBSE950
Hardware solutions / Routers & switches, VoIP, GSM, etc
RBSE960
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor:

Description

The vulnerability allows a remote user to compromise vulnerable system

The vulnerability exists due to hidden functionality (backdoor) is present in software within the ubus backend communications functionality. A remote administrator can use this functionality to gain full access to the application and execute arbitrary commands on the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions


External links
http://talosintelligence.com/vulnerability_reports/TALOS-2022-1597
http://kb.netgear.com/000065424/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0188


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability