NETGEAR has addressed seven vulnerabilities whose severity may range from critical to medium. Attackers can abuse these vulnerabilities to perform Authentication Bypass, Command Injection, Buffer Overflow, Improper Certificate Validation, Arbitrary File Upload, and remote code execution vulnerabilities. It is the prime duty of all users of NETGEAR to take a look at these vulnerabilities and fix them at the earliest. Let’s see How to Fix Multiple Vulnerabilities in Multiple NETGEAR Products.
Without further delay let’s discuss these multiple vulnerabilities in multiple NETGEAR Products and how to fix them.
Table of Contents
List Of Multiple Vulnerabilities In Multiple NETGEAR Products
There are total of seven vulnerabilities ranging from critical to medium. Here is a list of vulnerabilities found in multiple NETGEAR products.
- CVE-2022-27642, CVE-2022-27647: Authentication Bypass and Command Injection Vulnerabilities in Multiple NETGEAR Products.
- CVE-2022-27643: Buffer Overflow Vulnerability in Multiple NETGEAR Products.
- CVE-2022-27644, CVE-2022-27646: Improper Certificate Validation Vulnerability and Stack-based Buffer Overflow Vulnerabilities in Multiple NETGEAR Products.
- CVE-2022-27645: Authentication Bypass Vulnerability in Multiple NETGEAR Products.
- CVE-2011-5325: Arbitrary File Upload Vulnerability in Multiple NETGEAR Products.
Summary Of CVE-2022-27642, CVE-2022-27647
CVE-2022-27642 vulnerability enables network-adjacent hackers to bypass authentication on vulnerable versions of NETGEAR routers. However, authentication is not required to exploit the vulnerability. This vulnerability exists within the HTTPS service. It results due to incorrect string matching logic while accessing protected pages.
CVE-2022-27647 vulnerability enables network-adjacent hackers to execute arbitrary code on affected installations of NETGEAR R6700v3 router modules. Authentication is needed to exploit this vulnerability, but the existing authentication method can be bypassed. The problem results due to a lack of proper validation of string before executing a system call.
CVE ID | CVE-2022-27642, CVE-2022-27647 |
CVSS Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVSS Score | 7.5 |
CVSS Rating: | High |
Reported Date | 2021-12-01 |
Fixed Date | 2022-03-23 |
Summary Of CVE-2022-27643
CVE-2022-27643 vulnerability enables network-adjacent hackers to execute arbitrary code on vulnerable versions of NETGEAR router modules. Authentication is not needed to exploit this vulnerability. The vulnerability exists within the handling of SOAP requests.
CVE ID | CVE-2022-27643 |
CVSS Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
CVSS Score | 7.3 |
CVSS Rating: | High |
Reported Date | 2021-12-03 |
Fixed Date | 2022-03-23 |
Summary Of CVE-2022-27644, CVE-2022-27646
CVE-2022-27644 vulnerability enables network-adjacent hackers to compromise the integrity of downloaded information on vulnerable versions of NETGEAR router modules. Authentication is not needed to exploit this vulnerability. The vulnerability exists within the file downloads via HTTP. The problem is due to the lack of proper validation of certificates presented by the server.
CVE-2022-27646 vulnerability enables network-adjacent hackers to execute arbitrary code on affected versions of NETGEAR router modules. Authentication is needed to exploit this vulnerability, but the existing authentication method can be bypassed. The vulnerability exists within the circled daemon.
CVE ID | CVE-2022-27644, CVE-2022-27646 |
CVSS Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
CVSS Score | 7.3 |
CVSS Rating: | High |
Reported Date | 2021-12-01 |
Fixed Date | 2022-03-23 |
Summary Of CVE-2022-27645
CVE-2022-27645 vulnerability enables network-adjacent hackers to bypass authentication on vulnerable versions of NETGEAR router modules. To exploit this vulnerability, there is no need to perform authentication. The vulnerability exists within the readycloud_control.cgi.
CVE ID | CVE-2022-27645 |
CVSS Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
CVSS Score | 76.2 |
CVSS Rating: | Medium |
Reported Date | 2021-12-01 |
Fixed Date | 2022-03-23 |
Summary Of CVE-2011-5325
CVE-2011-5325 vulnerability enables network-adjacent hackers to upload arbitrary files on affected versions of NETGEAR router modules. To exploit this vulnerability, there is no need to perform authentication. The vulnerability exists within the Circle Parental Control feature, listens on TCP ports 4444 and 4567.
CVE ID | CVE-2011-5325 |
CVSS Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
CVSS Score | 8.6 |
CVSS Rating: | High |
Reported Date | 2022-01-07 |
Fixed Date | 2022-03-23 |
List Of NETGEAR Products Affected By These Vulnerabilities
Here you can see the list of the products affected by vulnerabilities. We urge you to carefully go through the table and list out the vulnerabilities identified in your modules and upgrade the firmware to the fixed version or the latest available for download.
Caution: We always recommend reading the product guide or contacting the vendor support team before upgrading firmware. The wrong firmware upgrade may break your device or lead to permanent damage.
Vulnerabilities | Products |
CVE-2022-27642, CVE-2022-27647 | Cable Modem Routers CAX80 fixed in firmware version 2.1.3.7 Fixed Wireless Nighthawk Mesh WiFi Systems Routers |
CVE-2022-27643 | DSL Modem Routers D6220 fixed in firmware version 1.0.0.80 D6400 fixed in firmware version 1.0.0.114 D7000v2 fixed in firmware version 1.0.0.80 Fixed Wireless Routers Wireless |
CVE-2022-27644, CVE-2022-27646 | Orbi WiFi Systems CBR40 fixed in firmware version 2.5.0.28 Routers |
CVE-2022-27645 | Fixed Wireless LAX20 fixed in firmware version v1.1.6.34 Routers |
CVE-2011-5325 | Orbi WiFi Systems CBR40 fixed in firmware version 2.5.0.28 Routers |
How To Fix These Vulnerabilities In NETGEAR Products?
There could be different ways to upgrade the firmware. Firmware upgradation through the Nighthawk app is the easiest way to upgrade firmware. You can click here for more information. The second popular method is to upgrade firmware through the Web Browser. You can learn about upgrading firmware through a web browser from here. However, if you are on a corporate network manual firmware upgrade would be the best option to go with.
How to Fix These Vulnerabilities in NETGEAR Products?
There could be different ways to upgrade the firmware. Firmware upgradation through the Nighthawk app is the easiest way to upgrade firmware. You can click here for more information. The second popular method is to upgrade firmware through the Web Browser. You can learn about upgrading firmware through a web browser from here. However, if you are on a corporate network manual firmware upgrade would be the best option to go with.
Method 1: How to Update the NETGEAR products using Nighthawk app?
This method is best for home users.
- Download the Netgear app for your iOS or Android devices.
- Connect your smartphone to the WiFi network.
- Open the Netgear app.
- Login to the dashboard with router admin credentials.
- Tap on your router.
- Brose to the Settings and hit on Check For Updates.
- If your device has updates, then you will see update enabled. Click on Update.
Method 2: How to Update the NETGEAR products using Nighthawk app?
This method is good for home, small shop, or small business where the devices are installed on the personal network.
- Connect you computer to your router through wired or wireless connection.
- Open the web browser and browse routerlogin.net.
- Login to the web dashboard with router admin credentials.
- Select ADVANCED > Administration or Settings > Administration.
- Select Firmware Update or Router Update.
- Click Check.
- If your device has updates, then click Yes to upgrade the firmware.
Method 3: How to Update the NETGEAR products manually?
This is the preferable method for devices on the small to large size corporate network.
- Connect your system with an Ethernet cable or Wifi.
- Visit the NETGEAR Support.
- Input the Product Name or router’s Model Number.
- Click Downloads.
- Choose a firmware version and click Download.
- Enter routerlogin.net into the web browser.
- Enter the admin username and password.
- Select Advanced> Administration.
- Select Router Update or Firmware Update.
- Click Browse or Choose File. Locate and select the file that ends in .chk or .img.
- Click the Upload button. The firmware update starts, and the process takes a few minutes.
We hope this post will help you know How to Fix Multiple Vulnerabilities in Multiple NETGEAR Products. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
原创文章,作者:ItWorker,如若转载,请注明出处:https://blog.ytso.com/270185.html