Authentication Hijacking Vulnerability in NETGEAR Smart Switches
CVE-2021-40867
7.8HIGH
Summary
Certain NETGEAR smart switches are exposed to a race-condition vulnerability allowing unauthenticated attackers to hijack an admin's login session. This vulnerability arises when an attacker shares the same source IP address as an administrator, which can occur in scenarios such as NAT environments or if the attacker already has access to the admin's machine. The multi-step HTTP authentication process utilized by these switches is inadequately secured, as it relies solely on the source IP address, thereby allowing attackers to manipulate authentication sessions and potentially gain unauthorized administrative access to the device.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved