Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

NETGEAR Nighthawk WiFi6 Router Network Misconfiguration

Medium

Synopsis

A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned on ports 22 and 23 by default. This misconfiguration could allow an attacker to interact with services only intended to be accessible by clients on the local network.

Solution

Apply the most recent vendor supplied patch. At the time of this writing, the most recent patch can be found here: https://kb.netgear.com/000065411/RAX30-Firmware-Version-1-0-9-90-Hot-Fix

Please note that at the time of this writing, the auto-update and "Check for Updates" mechanisms of the device do not appear to detect that this patch is available. It must be applied manually.

Disclosure Timeline

December 1, 2022 - Tenable discovers patch related to a flaw pending disclosure.
December 2, 2022 - Tenable reaches out to vendor for CVE identifier.
December 9, 2022 - Tenable notifies vendor of CVE assignment.

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2022-4390
Tenable Advisory ID: TRA-2022-36
CVSSv3 Base / Temporal Score:
5.3 / 4.8
CVSSv3 Vector:
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
NETGEAR Nighthawk WiFi6 Router prior to V1.0.9.90
Risk Factor:
Medium

Advisory Timeline

December 2, 2022 - Initial release.
December 9, 2022 - Added CVE identifier and additional reference.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now