NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vulnerability
CVE-2023-34284
6.3MEDIUM
Summary
The NETGEAR RAX30 router is susceptible to a significant authentication bypass due to the presence of hard-coded credentials. This vulnerability allows network-adjacent attackers to access the configuration interface without requiring authentication, leveraging the inadequately protected CLI service. The specific flaw exists within the system's configuration, which contains a hardcoded user account that offers low-privileged access. Attackers can exploit this weakness to gain unauthorized access, posing a risk to network integrity and user privacy. Detailed advisories and further information are available through vendor and security advisory resources.
Affected Version(s)
RAX30 1.0.9.92_1
References
CVSS V3.1
Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved