SB2022010310 - Multiple vulnerabilities in Netgear R6700 



SB2022010310 - Multiple vulnerabilities in Netgear R6700

Published: January 3, 2022

Security Bulletin ID SB2022010310
Severity
Low
Patch available
NO
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Command Injection (CVE-ID: CVE-2021-20173)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to improper input validation in update functionality. A remote authenticated attacker on the local network can trigger a system update check via the SOAP interface and execute arbitrary commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Cleartext transmission of sensitive information (CVE-ID: CVE-2021-20174)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can gain access to sensitive data.


3) Cleartext transmission of sensitive information (CVE-ID: CVE-2021-20175)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information in the SOAP interface. A remote attacker can gain access to sensitive data.


4) Protection Mechanism Failure (CVE-ID: CVE-2021-23147)

The vulnerability allows a local attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures in the UART port. An attacker with physical access can bypass implemented security restrictions and elevate privileges on the system.


5) Use of hard-coded credentials (CVE-ID: CVE-2021-45732)

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded credentials in application code in the UART port. A remote authenticated attacker on the local network can access the affected system using the hard-coded credentials.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Cleartext storage of sensitive information (CVE-ID: CVE-2021-45077)

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to the storage of sensitive information in plain-text. A local attacker can retrieve sensitive information stored in cleartext.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.