Multiple Netgear Vulnerabilities Let Attackers Bypass Authentication


NETGEAR has released an update to the firmware to address a high-severity authentication bypass vulnerability that currently affects CAX30 models. 

The attacker exploiting this flaw (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) could potentially gain full control of the vulnerable device without requiring any user interaction, leading to a complete device compromise. 

EHA

A post-authentication buffer overflow flaw in NETGEAR R7000 routers with firmware versions earlier than 1.0.11.216 could let an attacker with local network access and remote authentication run any code on the affected device, which could compromise the whole system because the input is not checked correctly. 

Stored cross-site scripting vulnerabilities in XR1000 firmware before version 1.0.0.72 could allow attackers to inject malicious scripts into the affected device, potentially enabling them to steal sensitive information, hijack user sessions, or redirect users to malicious websites. 

Post-authentication command injection vulnerability in the NETGEAR XR1000 router firmware before version 1.0.0.72 could allow an authenticated attacker to execute arbitrary commands on the affected device, potentially leading to a complete system compromise. 

Are you from SOC/DFIR Teams? - Sign up for a free ANY.RUN account! to Analyse Advanced Malware Files

The high-severity security misconfiguration vulnerability in the XR1000 router model has been identified and fixed, which specifically affects firmware versions that were released before 1.0.0.72. 

This vulnerability, which can be exploited locally with a low level of complexity, could potentially result in a significant compromise of the affected device, including unauthorized access and control.

A critical authentication bypass vulnerability has affected the XR1000 router model. NETGEAR released a firmware update to address the issue

Successful exploitation of this flaw could grant an unauthenticated attacker high-level privileges, potentially leading to complete device compromise.

To mitigate this risk, users are strongly urged to update to firmware version 1.0.0.72 immediately. 

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo



Source link