Authentication Hijacking Vulnerability in NETGEAR Smart Switches
CVE-2021-40867

7.8HIGH

Key Information:

Vendor
Netgear
Vendor
CVE Published:
13 September 2021

Summary

Certain NETGEAR smart switches are exposed to a race-condition vulnerability allowing unauthenticated attackers to hijack an admin's login session. This vulnerability arises when an attacker shares the same source IP address as an administrator, which can occur in scenarios such as NAT environments or if the attacker already has access to the admin's machine. The multi-step HTTP authentication process utilized by these switches is inadequately secured, as it relies solely on the source IP address, thereby allowing attackers to manipulate authentication sessions and potentially gain unauthorized administrative access to the device.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.