Security

Research

Cisco kindly reveals proof of concept attacks for flaws in rival Netgear's kit

Maybe this is deserved given the problem's in a hidden telnet service


Public proof-of-concept exploits have landed for bugs in Netgear Orbi routers – including one critical command execution vulnerability. 

The four vulnerabilities are found in Netgear's Orbi mesh wireless system, including its main router and the satellite routers that extend Wi-Fi networks. Cisco Talos researchers disclosed these bugs to Netgear on August 30, 2022. Since the 90-day countdown has run its course on Cisco's vulnerability disclosure policy, the networking giant has publicly detailed the security flaws and posted proofs of concept (PoC) for three of them.

The good news: three of the four vulnerabilities have been patched. 

The bad news: Netgear is still working on a fix for the fourth bug, for which Cisco has helpfully provided a PoC exploit. As such, miscreants are probably scanning for exposed, vulnerable routers to attack. Thanks, Cisco!

The also good news, actually: exploiting it will require some work – and credentials.

Talos's Dave McDaniel discovered this unpatched vulnerability – tracked as CVE-2022-38452 – in the main Orbi router RBR750 4.6.8.5, and says it's due to a flaw in the hidden telnet service functionality. An attacker in possession of a username, password and media access control address of the device's br-lan interface can send a specially crafted network request to exploit this bug, which leads to arbitrary command execution.

At press time, Netgear had not responded to The Register's inquiries about when it will issue a fix, or if the bug has been found and exploited in the wild.

The most serious flaw of the bunch – CVE-2022-37337, for which a patch is available – is a 9.1-rated critical vulnerability in the access control functionality of the Orbi router RBR750 4.6.8.5. A remote, authenticated attacker could exploit this flaw by sending a specially crafted HTTP request to the router and then execute arbitrary commands on the device.

Luckily it only works if the user is authenticated, "meaning they'd need to access an unprotected network, or the login credentials of a password-protected network, for this attack to be successful," Talos's Jonathan Munshaw noted in a blog post.

CVE-2022-36429, which affects the Orbi satellite router RBS750 4.6.8.5, can also lead to arbitrary command execution. It's due to a flaw in the ubus backend communications functionality, which allows the main router and satellite devices to communicate with each other. 

An attacker with access to the web GUI password – or default password if the user never changed it – could log into a hidden telnet service, send a specially crafted JSON object and then execute arbitrary commands on the device. Luckily there's a patch.

Finally CVE-2022-38458, a cleartext transmission vulnerability in the main Orbi router RBR750 4.6.8.5, can allow a miscreant to carry out a man-in-the-middle attack, which can lead to sensitive information disclosure. Netgear has issued a patch, and Cisco Talos did not publish a PoC for this one. ®

Send us news
24 Comments

Cisco intros AI to find firewall flaws, warns this sort of thing can't be free

Predicts cyber crims will find binary brainboxes harder to battle

Uh-oh, update Google Chrome – exploit already out there for one of these 6 security holes

Plus: 3 critical CVEs in Zyxel NAS devices

Cisco's cloud network push will tie licensing change to generational product refreshes

Bundled support has already come to Catalyst – but don't bother asking how it works

A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list

Apparently no one thought to check if this D-Link router 'issue' was actually exploitable

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

Cisco delivers a powerup to its switches for small and medium biz

Catalyst 1200 and 1300 keep perpetual licenses, PoE and stackability

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code

Apple and some Linux distros are open to Bluetooth attack

Issue has been around since at least 2012

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

Weak session keys let snoops take a byte out of your Bluetooth traffic

BLUFFS spying flaw present in iPhones, ThinkPad, plenty of chipsets

Microsoft's bug bounty turns 10. Are these kinds of rewards making code more secure?

Katie Moussouris, who pioneered Redmond's program, says folks are focusing on the wrong thing

Apple slaps patch on WebKit holes in iPhones and Macs amid fears of active attacks

Two CVEs can be abused to steal sensitive info or execute code