Information disclosure in NETGEAR Routers and WiFi system



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID N/A
CWE-ID CWE-200
Exploitation vector Local network
Public exploit N/A
Vulnerable software
RBR40
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBK22
Hardware solutions / Routers & switches, VoIP, GSM, etc

LBR20
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBK50
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBK40
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBK12
Hardware solutions / Routers & switches, VoIP, GSM, etc

XR450
Hardware solutions / Routers & switches, VoIP, GSM, etc

LBR1020
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBR10
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBR20
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBR50
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBS10
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBS20
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBS40
Hardware solutions / Routers & switches, VoIP, GSM, etc

RBS50
Hardware solutions / Routers & switches, VoIP, GSM, etc

XR500
Hardware solutions / Routers & switches, VoIP, GSM, etc

D7800
Hardware solutions / Routers for home users

R7800
Hardware solutions / Routers for home users

R8900
Hardware solutions / Routers for home users

RAX10
Hardware solutions / Routers for home users

RAX70
Hardware solutions / Routers for home users

RAX120
Hardware solutions / Routers for home users

XR700
Hardware solutions / Routers for home users

R9000
Hardware solutions / Routers for home users

RAX120v2
Hardware solutions / Routers for home users

Vendor NETGEAR

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU64821

Risk: Low

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: N/A

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote attacker on the local network can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

RBR40: All versions

RBK22: All versions

D7800: All versions

LBR20: All versions

RBK50: All versions

RBK40: All versions

RBK12: All versions

R7800: All versions

R8900: All versions

RAX10: All versions

RAX70: All versions

RAX120: All versions

XR450: All versions

XR700: All versions

LBR1020: All versions

R9000: All versions

RAX120v2: All versions

RBR10: All versions

RBR20: All versions

RBR50: All versions

RBS10: All versions

RBS20: All versions

RBS40: All versions

RBS50: All versions

XR500: All versions

CPE2.3 External links

https://kb.netgear.com/000065039/Security-Advisory-for-Arbitrary-File-Read-on-Some-Routers-and-WiFi-system-PSV-2021-0006


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###