CVE-2020-17409
NETGEAR Multiple Routers mini_httpd Authentication Bypass Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020 routers with firmware 1.0.66. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10754.
Esta vulnerabilidad permite a atacantes adyacentes a la red divulgar información confidencial sobre las instalaciones afectadas de los enrutadores NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210 y WNR2020 con versiones de firmware 1.0.66. No es requerida una autenticación para explotar esta vulnerabilidad. El fallo específico se presenta dentro del servicio mini_httpd, que escucha en el puerto TCP 80 por defecto. El problema resulta de una lógica de coincidencia de cadenas incorrecta cuando se accede a páginas protegidas. Un atacante puede aprovechar esta vulnerabilidad para revelar las credenciales almacenadas, conllevando a un mayor compromiso. Fue ZDI-CAN-10754
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-08-07 CVE Reserved
- 2020-09-15 CVE Published
- 2024-08-04 CVE Updated
- 2024-10-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-20-1176 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://kb.netgear.com/000062304/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2020-0258 | 2020-12-03 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Netgear Search vendor "Netgear" | R6020 Firmware Search vendor "Netgear" for product "R6020 Firmware" | < 1.0.0.44 Search vendor "Netgear" for product "R6020 Firmware" and version " < 1.0.0.44" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6020 Search vendor "Netgear" for product "R6020" | - | - |
Safe
|
Netgear Search vendor "Netgear" | R6080 Firmware Search vendor "Netgear" for product "R6080 Firmware" | < 1.0.0.44 Search vendor "Netgear" for product "R6080 Firmware" and version " < 1.0.0.44" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6080 Search vendor "Netgear" for product "R6080" | - | - |
Safe
|
Netgear Search vendor "Netgear" | R6120 Firmware Search vendor "Netgear" for product "R6120 Firmware" | < 1.0.0.70 Search vendor "Netgear" for product "R6120 Firmware" and version " < 1.0.0.70" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6120 Search vendor "Netgear" for product "R6120" | - | - |
Safe
|
Netgear Search vendor "Netgear" | R6220 Firmware Search vendor "Netgear" for product "R6220 Firmware" | < 1.1.0.100 Search vendor "Netgear" for product "R6220 Firmware" and version " < 1.1.0.100" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6220 Search vendor "Netgear" for product "R6220" | - | - |
Safe
|
Netgear Search vendor "Netgear" | R6230 Firmware Search vendor "Netgear" for product "R6230 Firmware" | < 1.1.0.100 Search vendor "Netgear" for product "R6230 Firmware" and version " < 1.1.0.100" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6230 Search vendor "Netgear" for product "R6230" | - | - |
Safe
|
Netgear Search vendor "Netgear" | R6260 Firmware Search vendor "Netgear" for product "R6260 Firmware" | < 1.1.0.76 Search vendor "Netgear" for product "R6260 Firmware" and version " < 1.1.0.76" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6260 Search vendor "Netgear" for product "R6260" | - | - |
Safe
|
Netgear Search vendor "Netgear" | R6330 Firmware Search vendor "Netgear" for product "R6330 Firmware" | < 1.1.0.76 Search vendor "Netgear" for product "R6330 Firmware" and version " < 1.1.0.76" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6330 Search vendor "Netgear" for product "R6330" | - | - |
Safe
|
Netgear Search vendor "Netgear" | R6350 Firmware Search vendor "Netgear" for product "R6350 Firmware" | < 1.1.0.76 Search vendor "Netgear" for product "R6350 Firmware" and version " < 1.1.0.76" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6350 Search vendor "Netgear" for product "R6350" | - | - |
Safe
|
Netgear Search vendor "Netgear" | R6850 Firmware Search vendor "Netgear" for product "R6850 Firmware" | < 1.1.0.76 Search vendor "Netgear" for product "R6850 Firmware" and version " < 1.1.0.76" | - |
Affected
| in | Netgear Search vendor "Netgear" | R6850 Search vendor "Netgear" for product "R6850" | - | - |
Safe
|
Netgear Search vendor "Netgear" | Jnr3210 Firmware Search vendor "Netgear" for product "Jnr3210 Firmware" | - | - |
Affected
| in | Netgear Search vendor "Netgear" | Jnr3210 Search vendor "Netgear" for product "Jnr3210" | - | - |
Safe
|
Netgear Search vendor "Netgear" | Wnr2020 Firmware Search vendor "Netgear" for product "Wnr2020 Firmware" | - | - |
Affected
| in | Netgear Search vendor "Netgear" | Wnr2020 Search vendor "Netgear" for product "Wnr2020" | - | - |
Safe
|