Cyber Security

Critical Auth Bypass Bug Affect NETGEAR Smart Switches — Patch and PoC Released

Networking, storage and security solutions provider Netgear on Friday issued patches to address three security vulnerabilities affecting its smart switches that could be abused by an adversary to gain full control of a vulnerable device.

The flaws, which were discovered and reported to Netgear by Google security engineer Gynvael Coldwind, impact the following models –

  • GC108P (fixed in firmware version
  • GC108PP (fixed in firmware version
  • GS108Tv3 (fixed in firmware version
  • GS110TPP (fixed in firmware version
  • GS110TPv3 (fixed in firmware version
  • GS110TUP (fixed in firmware version
  • GS308T (fixed in firmware version
  • GS310TP (fixed in firmware version
  • GS710TUP (fixed in firmware version
  • GS716TP (fixed in firmware version
  • GS716TPP (fixed in firmware version
  • GS724TPP (fixed in firmware version
  • GS724TPv2 (fixed in firmware version
  • GS728TPPv2 (fixed in firmware version
  • GS728TPv2 (fixed in firmware version
  • GS750E (fixed in firmware version
  • GS752TPP (fixed in firmware version
  • GS752TPv2 (fixed in firmware version
  • MS510TXM (fixed in firmware version
  • MS510TXUP (fixed in firmware version

According to Coldwind, the flaws concern an authentication bypass, an authentication hijacking, and a third as-yet-undisclosed vulnerability that could grant an attacker the ability to change the administrator password without actually having to know the previous password or hijack the session bootstrapping information, resulting in a full compromise of the device.

The three vulnerabilities have been given the codenames Demon’s Cries (CVSS score: 9.8), Draconian Fear (CVSS score: 7.8), and Seventh Inferno (TBD).

“A funny bug related to authorization spawns from the fact that the password is obfuscated by being XORed with ‘NtgrSmartSwitchRock,” Coldwind said in a write-up explaining the authentication bypass. “However, due to the fact that in the handler of TLV type 10 an strlen() is called on the still obfuscated password, it makes it impossible to authenticate correctly with a password that happens to have the same character as the phrase above at a given position.”

Draconian Fear, on the other hand, requires the attacker to either have the same IP address as the admin or be able to spoof the address through other means. In such a scenario, the malicious party can take advantage of the fact that the Web UI relies only on the IP and a trivially guessable “userAgent” string to flood the authentication endpoint with multiple requests, thereby “greatly increasing the odds of getting the session information before admin’s browser gets it.”

In light of the critical nature of the vulnerabilities, companies relying on the aforementioned Netgear switches are recommended to upgrade to the latest version as soon as possible to mitigate any potential exploitation risk.

Products You May Like

Articles You May Like

Waymo Starts Selling Sensors to Lower Cost of Self-Driving Cars
Foxconn Feels Sting of Fewer Smartphone Sales, Says Demand Slowing After Pandemic-Fuelled Boom
China Launches 16 New Satellites Into Orbit for Commercial Remote Sensing, Atmospheric Imaging: Report
Snap Launches Parental Control Tool Family Center, Lets Parents Check Teens’ Contacts
Apple’s Decision to Delay iPadOS 16 Release Could Cause Problems for Some Users, Developers: Mark Gurman

Leave a Reply

Your email address will not be published.