// For flags

CVE-2017-5521

NETGEAR Multiple Devices Exposure of Sensitive Information Vulnerability

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered on NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900, and R8000 devices. They are prone to password disclosure via simple crafted requests to the web management server. The bug is exploitable remotely if the remote management option is set, and can also be exploited given access to the router over LAN or WLAN. When trying to access the web panel, a user is asked to authenticate; if the authentication is canceled and password recovery is not enabled, the user is redirected to a page that exposes a password recovery token. If a user supplies the correct token to the page /passwordrecovered.cgi?id=TOKEN (and password recovery is not enabled), they will receive the admin password for the router. If password recovery is set the exploit will fail, as it will ask the user for the recovery questions that were previously set when enabling that feature. This is persistent (even after disabling the recovery option, the exploit will fail) because the router will ask for the security questions.

Se ha descubierto un problema en dispositivos NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900 y R8000. Son propensos a revelar la contraseña a través de peticiones simples manipuladas al servidor de gestión de la web. El error es explotable remotamente si la opción de gestión remota está activada, y también puede ser explotado dado el acceso al router a través de LAN o WLAN. Cuando se trata de acceder al panel web, se pide al usuario que se autentique; si la autenticación se cancela y la recuperación de contraseña no está habilitada, el usuario es redirigido a una página que revela un token de recuperación de contraseña. Si un usuario proporciona el token correcto a la página /passwordrecovered.cgi?id=TOKEN (y la recuperación de contraseña no está habilitada), recibirán la contraseña de administrador para el router. Si la recuperación de contraseña está habilitada, la explotación fallará, ya que pedirá al usuario preguntas para la recuperación que fueron previamente establecidas cuando se habilitó esa característica. Esto es persistente (incluso tras la inhabilitación de la opción de recuperación, la explotación fallará) porque el router preguntará por las preguntas de seguridad.

Multiple Netgear routers suffers from remote and local password disclosure vulnerabilities.

Multiple NETGEAR devices are prone to admin password disclosure via simple crafted requests to the web management server.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-01-17 CVE Reserved
  • 2017-01-17 CVE Published
  • 2022-09-08 Exploited in Wild
  • 2022-09-29 KEV Due Date
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • 2024-11-09 EPSS Updated
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netgear
Search vendor "Netgear"
R6200 Firmware
Search vendor "Netgear" for product "R6200 Firmware"
1.0.1.56_1.0.43
Search vendor "Netgear" for product "R6200 Firmware" and version "1.0.1.56_1.0.43"
-
Affected
in Netgear
Search vendor "Netgear"
R6200
Search vendor "Netgear" for product "R6200"
--
Safe
Netgear
Search vendor "Netgear"
R6300 Firmware
Search vendor "Netgear" for product "R6300 Firmware"
1.0.2.78_1.0.58
Search vendor "Netgear" for product "R6300 Firmware" and version "1.0.2.78_1.0.58"
-
Affected
in Netgear
Search vendor "Netgear"
R6300
Search vendor "Netgear" for product "R6300"
--
Safe
Netgear
Search vendor "Netgear"
Vegn2610 Firmware
Search vendor "Netgear" for product "Vegn2610 Firmware"
1.0.0.36
Search vendor "Netgear" for product "Vegn2610 Firmware" and version "1.0.0.36"
-
Affected
in Netgear
Search vendor "Netgear"
Vegn2610
Search vendor "Netgear" for product "Vegn2610"
--
Safe
Netgear
Search vendor "Netgear"
Ac1450 Firmware
Search vendor "Netgear" for product "Ac1450 Firmware"
1.0.0.34_10.0.16
Search vendor "Netgear" for product "Ac1450 Firmware" and version "1.0.0.34_10.0.16"
-
Affected
in Netgear
Search vendor "Netgear"
Ac1450
Search vendor "Netgear" for product "Ac1450"
--
Safe
Netgear
Search vendor "Netgear"
Wnr1000v3 Firmware
Search vendor "Netgear" for product "Wnr1000v3 Firmware"
1.0.2.68_60.0.93
Search vendor "Netgear" for product "Wnr1000v3 Firmware" and version "1.0.2.68_60.0.93"
-
Affected
in Netgear
Search vendor "Netgear"
Wnr1000v3
Search vendor "Netgear" for product "Wnr1000v3"
--
Safe
Netgear
Search vendor "Netgear"
Wndr3700v3 Firmware
Search vendor "Netgear" for product "Wndr3700v3 Firmware"
1.0.0.40_1.0.32
Search vendor "Netgear" for product "Wndr3700v3 Firmware" and version "1.0.0.40_1.0.32"
-
Affected
in Netgear
Search vendor "Netgear"
Wndr3700v3
Search vendor "Netgear" for product "Wndr3700v3"
--
Safe
Netgear
Search vendor "Netgear"
Wndr4000 Firmware
Search vendor "Netgear" for product "Wndr4000 Firmware"
1.0.2.4_9.1.86
Search vendor "Netgear" for product "Wndr4000 Firmware" and version "1.0.2.4_9.1.86"
-
Affected
in Netgear
Search vendor "Netgear"
Wndr4000
Search vendor "Netgear" for product "Wndr4000"
--
Safe
Netgear
Search vendor "Netgear"
Wndr4500 Firmware
Search vendor "Netgear" for product "Wndr4500 Firmware"
1.0.1.44_1.0.73
Search vendor "Netgear" for product "Wndr4500 Firmware" and version "1.0.1.44_1.0.73"
-
Affected
in Netgear
Search vendor "Netgear"
Wndr4500
Search vendor "Netgear" for product "Wndr4500"
--
Safe
Netgear
Search vendor "Netgear"
D6400 Firmware
Search vendor "Netgear" for product "D6400 Firmware"
1.0.0.44
Search vendor "Netgear" for product "D6400 Firmware" and version "1.0.0.44"
-
Affected
in Netgear
Search vendor "Netgear"
D6400
Search vendor "Netgear" for product "D6400"
--
Safe
Netgear
Search vendor "Netgear"
D6220 Firmware
Search vendor "Netgear" for product "D6220 Firmware"
1.0.0.12
Search vendor "Netgear" for product "D6220 Firmware" and version "1.0.0.12"
-
Affected
in Netgear
Search vendor "Netgear"
D6220
Search vendor "Netgear" for product "D6220"
--
Safe
Netgear
Search vendor "Netgear"
D6300 Firmware
Search vendor "Netgear" for product "D6300 Firmware"
1.0.0.96
Search vendor "Netgear" for product "D6300 Firmware" and version "1.0.0.96"
-
Affected
in Netgear
Search vendor "Netgear"
D6300
Search vendor "Netgear" for product "D6300"
--
Safe
Netgear
Search vendor "Netgear"
D6300b Firmware
Search vendor "Netgear" for product "D6300b Firmware"
1.0.0.40
Search vendor "Netgear" for product "D6300b Firmware" and version "1.0.0.40"
-
Affected
in Netgear
Search vendor "Netgear"
D6300b
Search vendor "Netgear" for product "D6300b"
--
Safe
Netgear
Search vendor "Netgear"
Dgn2200bv4 Firmware
Search vendor "Netgear" for product "Dgn2200bv4 Firmware"
1.0.0.68
Search vendor "Netgear" for product "Dgn2200bv4 Firmware" and version "1.0.0.68"
-
Affected
in Netgear
Search vendor "Netgear"
Dgn2200bv4
Search vendor "Netgear" for product "Dgn2200bv4"
--
Safe