Security News > 2021 > September > High-Severity RCE Flaw Disclosed in Several Netgear Router Models
Networking equipment company Netgear has released patches to remediate a high-severity remote code execution vulnerability affecting multiple routers that could be exploited by remote attackers to take control of an affected system.
Traced as CVE-2021-40847, the security weakness impacts the following models -.
According to GRIMM security researcher Adam Nichols, the vulnerability resides within Circle, a third-party component included in the firmware that offers parental control features, with the Circle update daemon enabled to run by default even if the router hasn't been configured to limit daily internet time for websites and apps.
This is made possible owing to the manner in which the update daemon connects to Circle and Netgear to fetch updates to the filtering database - which are both unsigned and downloaded using HTTP - thereby making it possible for an interloper to stage a MitM attack and respond to the update request with a specially-crafted compressed database file, extracting which gives the attacker the ability to overwrite executable binaries with malicious code.
"Since this code is run as root on the affected routers, exploiting it to obtain RCE is just as damaging as a RCE vulnerability found in the core Netgear firmware," Nichols said.
The disclosure comes weeks after Google security engineer Gynvael Coldwind revealed details of three severe security vulnerabilities dubbed Demon's Cries, Draconian Fear, and Seventh Inferno, impacting over a dozen of its smart switches, allowing threat actors to bypass authentication and gain full control of vulnerable devices.
News URL
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-09-21 | CVE-2021-40847 | Cleartext Transmission of Sensitive Information vulnerability in Netgear products The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. | 8.1 |