Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-27646: Security Advisory for Multiple Vulnerabilities on Multiple Products, PSV-2021-0324

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15879.

CVE
#vulnerability#mac#windows#auth#zero_day#wifi

Was this article helpful? Yes No

Associated CVE IDs: CVE-2022-27644, CVE-2022-27646

Associated ZDI IDs: ZDI-CAN-15797, ZDI-CAN-15879

First published: 2022-03-17

NETGEAR has released fixes for multiple security vulnerabilities on the following product models:

Orbi WiFi Systems

  • CBR40 fixed in firmware version 2.5.0.28
  • LBR1020 fixed in firmware version 2.7.4.2
  • LBR20 fixed in firmware version 2.7.4.2
  • RBR10 fixed in firmware version 2.7.4.24
  • RBR20 fixed in firmware version 2.7.4.24
  • RBR40 fixed in firmware version 2.7.4.24
  • RBR50 fixed in firmware version 2.7.4.24
  • RBS10 fixed in firmware version 2.7.4.24
  • RBS20 fixed in firmware version 2.7.4.24
  • RBS40 fixed in firmware version 2.7.4.24
  • RBS50 fixed in firmware version 2.7.4.24

Routers

  • R6400v2 fixed in firmware version 1.0.4.126
  • R6700v3 fixed in firmware version 1.0.4.126
  • R6900P fixed in firmware version 1.3.3.148
  • R7000 fixed in firmware version 1.0.11.134
  • R7000P fixed in firmware version 1.3.3.148
  • R7850 fixed in firmware version 1.0.5.84
  • R7960P fixed in firmware version 1.4.3.88
  • R8000 fixed in firmware version 1.0.4.84
  • R8000P fixed in firmware version 1.4.3.88
  • RAX200 fixed in firmware version 1.0.6.138
  • RAX75 fixed in firmware version 1.0.6.138
  • RAX80 fixed in firmware version 1.0.6.138
  • RS400 fixed in firmware version 1.5.1.86

NETGEAR strongly recommends that you download the latest firmware as soon as possible.

To download the latest firmware for your NETGEAR product:

  1. Visit NETGEAR Support.
  2. Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
    If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
  3. Click Downloads.
  4. Under Current Versions, select the download whose title begins with Firmware Version.
  5. Click Download.
  6. Follow the instructions in your product’s user manual, firmware release notes, or product support page to install the new firmware.

For cable products, new firmware is released by your Internet service provider after NETGEAR releases it to them. Firmware fixes for the following cable products have been released to all service providers:

  • CBR40

To see the latest firmware version for your cable product, visit What’s the latest firmware version of my NETGEAR cable modem or modem router?.

To check your cable product’s current firmware version, follow the steps in this knowledge base article: How do I view the firmware version of my cable modem or modem router?.

Disclaimer

This document is provided on an “as is” basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. NETGEAR reserves the right to change or update this document at any time. NETGEAR expects to update this document as new information becomes available.

The multiple vulnerabilities remain if you do not complete all recommended steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification.

Acknowledgements

Kevin Denis (@0xmitsurugi) and Antide Petit (@xarkes_) from @Synacktiv working with Trend Micro’s Zero Day Initiative

Common Vulnerability Scoring System

CVSS Rating: High

CVSS Score: 7.3

CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

Best Practices for Updating Firmware

We recommend that you keep your NETGEAR devices up to date with the latest firmware. Firmware updates contain security fixes, bug fixes, and new features for your NETGEAR products.

If your product is supported by one of our apps, using the app is the easiest way to update your firmware:

  • Orbi products: NETGEAR Orbi app
  • NETGEAR WiFi routers: NETGEAR Nighthawk app
  • Some NETGEAR Business products: NETGEAR Insight app (firmware updates through the app are available only for Insight subscribers)

If your product is not supported by one of our apps, you can always update your firmware manually by following the instructions in your product’s user manual, firmware release notes, or product support page. For more information, see Where can I find information about my NETGEAR product?.

Contact

We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.

It is NETGEAR’s mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.

To report a security vulnerability, visit http://www.netgear.com/about/security/.

If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at [email protected].

Revision History

2022-03-17: Published advisory

2022-03-22: Updated CVE IDs

2022-03-30: Added R7850, R8000

2022-05-31: Added LBR1020, LBR20, R7960P, R8000P, RAX200, RAX75, RAX80, RBR10, RBR20, RBR40, RBR50, RBS10, RBS20, RBS40, RBS50

Last Updated:05/31/2022 | Article ID: 000064721

Was this article helpful?Yes No

This article applies to:

  • Wireless AX Router Nighthawk (WiFi 6) (3)
    • RAX200
    • RAX75
    • RAX80
  • Orbi (11)
    • CBR40
    • LBR1020
    • LBR20
    • RBR10
    • RBR20
    • RBR40
    • RBR50
    • RBS10
    • RBS20
    • RBS40
    • RBS50
  • Wireless AC Router Nighthawk (9)
    • R6700v3
    • R6900P
    • R7000
    • R7000P
    • R7850
    • R7960P
    • R8000
    • R8000P
    • RS400
  • Wireless AC Router (1)
    • R6400v2

How to Find Your Model Number

Looking for more about your product?

Get information, documentation, videos and more for your specific product.

Need to Contact NETGEAR Support?

With NETGEAR’s round-the-clock premium support, help is just a phone call away.

Complimentary Support

NETGEAR provides complimentary technical support for NETGEAR products for 90 days from the original date of purchase.

Contact Support

NETGEAR Premium Support

GearHead Support for Home Users

GearHead Support is a technical support service for NETGEAR devices and all other connected devices in your home. Advanced remote support tools are used to fix issues on any of your devices. The service includes support for the following:

  • Desktop and Notebook PCs, Wired and Wireless Routers, Modems, Printers, Scanners, Fax Machines, USB devices and Sound Cards
  • Windows Operating Systems (2000, XP or Vista), MS Word, Excel, PowerPoint, Outlook and Adobe Acrobat
  • Anti-virus and Anti-Spyware: McAfee, Norton, AVG, eTrust and BitDefender

Learn More

ProSUPPORT Services for Business Users

NETGEAR ProSUPPORT services are available to supplement your technical support and warranty entitlements. NETGEAR offers a variety of ProSUPPORT services that allow you to access NETGEAR’s expertise in a way that best meets your needs:

  • Product Installation
  • Professional Wireless Site Survey
  • Defective Drive Retention (DDR) Service

Learn More

Related news

CVE-2022-27644: ZDI-22-520

This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15797.

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907