Security News > 2023 > May > Netgear Routers' Flaws Expose Users to Malware, Remote Attacks, and Surveillance
As many as five security flaws have been disclosed in Netgear RAX30 routers that could be chained to bypass authentication and achieve remote code execution.
"Successful exploits could allow attackers to monitor users' internet activity, hijack internet connections, and redirect traffic to malicious websites or inject malware into network traffic," Claroty security researcher Uri Katz said in a report.
A network-adjacent threat actor could also weaponize the flaws to access and control networked smart devices like security cameras, thermostats, smart locks; tamper with router settings, and even use a compromised network to launch attacks against other devices or networks.
A proof-of-concept exploit chain illustrated by the industrial cybersecurity firm shows that it's possible to string the flaws - CVE-2023-27357, CVE-2023-27369, CVE-2023-27368, CVE-2023-27370, and CVE-2023-27367 - to extract the device serial number and ultimately obtain root access to it.
"These five CVEs can be chained together to compromise affected RAX30 routers, the most severe of which enable pre-authentication remote code execution on the device," Katz noted.
Users of Netgear RAX30 routers are advised to update to firmware version 1.0.10.94 released by the networking company on April 7, 2023, to address the flaws and mitigate potential risks.
News URL
https://thehackernews.com/2023/05/netgear-routers-flaws-expose-users-to.html
Related news
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- Japan warns of IO-Data zero-day router flaws exploited in attacks (source)
- OpenWrt orders router firmware updates after supply chain attack scare (source)
- Update your OpenWrt router! Security issue made supply chain attack possible (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- FBI spots HiatusRAT malware attacks targeting web cameras, DVRs (source)
- Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack (source)
- Ruijie Networks' Cloud Platform Flaws Could've Exposed 50,000 Devices to Remote Attacks (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- Ivanti zero-day attacks infected devices with custom malware (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-05-03 | CVE-2023-27370 | Cleartext Storage of Sensitive Information vulnerability in Netgear Rax30 Firmware NETGEAR RAX30 Device Configuration Cleartext Storage Information Disclosure Vulnerability. | 5.7 |
2024-05-03 | CVE-2023-27369 | Out-of-bounds Write vulnerability in Netgear Rax30 Firmware NETGEAR RAX30 soap_serverd Stack-based Buffer Overflow Authentication Bypass Vulnerability. | 8.8 |
2024-05-03 | CVE-2023-27368 | Out-of-bounds Write vulnerability in Netgear Rax30 Firmware NETGEAR RAX30 soap_serverd Stack-based Buffer Overflow Authentication Bypass Vulnerability. | 8.8 |
2024-05-03 | CVE-2023-27367 | OS Command Injection vulnerability in Netgear Rax30 Firmware NETGEAR RAX30 libcms_cli Command Injection Remote Code Execution Vulnerability. | 8.0 |
2024-05-03 | CVE-2023-27357 | Missing Authentication for Critical Function vulnerability in Netgear Rax30 Firmware NETGEAR RAX30 GetInfo Missing Authentication Information Disclosure Vulnerability. | 6.5 |