Sunday, July 14, 2024

PoC Disclosed for Five Vulnerabilities to Exploit Netgear Routers

As the threats against the Internet of Things are on the rise, several types of research are going on to secure these devices.

As part of this, the Zero Day Initiative (ZDI) conducted a “Pwn2Own” competition in March. Multiple vulnerabilities were found in this competition on products belonging to many technology brands.

NetGear routers were one among the products in which vulnerabilities were reported.

The Cybersecurity solutions firm Claroty had their team82 in this competition. The team researched NetGear RAX30 routers and found five high-severity vulnerabilities that threat actors can exploit, enabling them to conduct pre-authenticated remote code execution, command injection, or authentication bypass.

The research team found a service soap_serverd running on port 5000 (HTTP) and 5043 (HTTPS) as API servers of the router.

These handle SOAP messages about management functionality vulnerable to a stack-based buffer overflow vulnerability. All the vulnerabilities found by the research team are listed below.

CVE-2023-27357 – Information Disclosure Vulnerability:

This vulnerability exists as there was no authentication for the “GetInfo” command. The response for this command consists of the device information such as model, serial number, firewall version, VPN version, and much more. 

GetInfo command retrieves Router information. Source: Claroty

CVE-2023-27368: – Buffer Overflow Authentication Bypass Vulnerability

This vulnerability arises as the soap_serverd service does not check the length of the data. In addition to this, the service reads the HTTP headers first and parses them using the sscanf function to extract the method, path, and HTTP version.

Vulnerable sscanf function

Though this lack of length check allows a stack-based buffer overflow vulnerability, the HTTP receives a function that runs on port 5000 and checks the length of the HTTP header, which limits us from exploiting it. However, there was a bypass which was discovered by the research team.

CVE-2023-27369 – Buffer Overflow Authentication Bypass Vulnerability

As mentioned earlier, two ports, 5043 (HTTPS or SSL) and 5000 (HTTP), run the soap_serverd service. Therefore, both ports had two different socket read and socket write functions.

In connection with the previous vulnerability (CVE-2023-27368), the SOAP message read by the 5043 port calls a socket read function which does not check how many bytes were read.

This socket read function can conduct a stack overflow by sending a large amount of data to be read, resulting in a stack-based buffer overflow.

CVE-2023-27370 – Bypass to Reset the Admin Password

While setting up the router, the users are requested to create a unique password for authenticating into the router dashboard. Along with this, some security questions must also be set for resetting the password in case the users forget their passwords.

The device configuration stores this information as plain text (base64).

To reset the password, the users need to enter the router’s serial number and answer the security questions previously set.

Using the three vulnerabilities mentioned above, an attacker can bypass the authentication and run the GetConfigInfo command, which returns all the information required for resetting the administrator password.

The GetConfigInfo command returns all the information.

CVE-2023-27367 – Authentication Bypass and Command Injection

The telnet service on port 23 is not enabled by default on NetGear routers. A vulnerability was discovered previously, which exists on the libcms_cli module that does not validate user-supplied commands before executing the system call.

The research team used an “open-telnet-magic-packet” to enable port 23 on the router. But still, the Telnet is restricted to specific commands.

They discovered that the TFTP command is not filtered before it is executed, which is connected with CVE-2023-27370. Hence, this TFTP interface can be used to run any command.

These five vulnerabilities are chained, which can exploit the RAX30 to enable remote command execution. Successful exploitation by a threat actor can lead to monitoring the user’s activity, redirecting traffic to malicious websites controlled by the attacker, hijacking an internet connection, or injecting malware into the network traffic.

Chaining of the five vulnerabilities. Source: Clarity

NETGEAR has released security advisories for these vulnerabilities and requested their customers upgrade their RAX30 routers to fix these vulnerabilities.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles