NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vulnerability
CVE-2023-34284

6.3MEDIUM

Key Information:

Vendor
Netgear
Status
Vendor
CVE Published:
3 May 2024

Summary

The NETGEAR RAX30 router is susceptible to a significant authentication bypass due to the presence of hard-coded credentials. This vulnerability allows network-adjacent attackers to access the configuration interface without requiring authentication, leveraging the inadequately protected CLI service. The specific flaw exists within the system's configuration, which contains a hardcoded user account that offers low-privileged access. Attackers can exploit this weakness to gain unauthorized access, posing a risk to network integrity and user privacy. Detailed advisories and further information are available through vendor and security advisory resources.

Affected Version(s)

RAX30 1.0.9.92_1

References

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.