CVE-2019-20699

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary code on affected NETGEAR switches via a buffer overflow. It affects specific NETGEAR switch models running vulnerable firmware versions. Attackers can exploit this without any authentication.

💻 Affected Systems

Products:
  • NETGEAR GS105Ev2
  • NETGEAR GS105PE
  • NETGEAR GS408EPP
  • NETGEAR GS808E
  • NETGEAR GS908E
  • NETGEAR GSS108E
  • NETGEAR GSS108EPP
Versions: GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS408EPP before 1.0.0.15, GS808E before 1.7.0.7, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices with default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, and lateral movement to other systems.

🟠

Likely Case

Remote code execution resulting in device takeover, denial of service, or credential harvesting.

🟢

If Mitigated

Limited impact if devices are patched, network segmented, and not internet-facing.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing devices extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthenticated exploitation allows attackers with network access to compromise devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Buffer overflow vulnerabilities in network devices are commonly weaponized. The unauthenticated nature makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GS105Ev2 1.6.0.4, GS105PE 1.6.0.4, GS408EPP 1.0.0.15, GS808E 1.7.0.7, GS908E 1.7.0.3, GSS108E 1.6.0.4, GSS108EPP 1.0.0.15

Vendor Advisory: https://kb.netgear.com/000061230/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Switches-PSV-2018-0538

Restart Required: Yes

Instructions:

1. Download appropriate firmware from NETGEAR support site. 2. Log into switch web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload firmware file. 5. Apply update and restart device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected switches from untrusted networks and internet access.

Access Control Lists

all

Implement ACLs to restrict management access to trusted IP addresses only.

🧯 If You Can't Patch

  • Immediately remove affected devices from internet-facing positions
  • Implement strict network segmentation and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > Information > Firmware Version

Check Version:

Check via web interface or SNMP: snmpget -v2c -c community_string device_ip .1.3.6.1.2.1.1.1.0

Verify Fix Applied:

Verify firmware version matches or exceeds patched versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Unusual management interface access attempts
  • Firmware modification logs

Network Indicators:

  • Unusual traffic patterns from switch management interfaces
  • Exploit payload patterns in network traffic

SIEM Query:

source="switch_logs" AND (event_type="reboot" OR event_type="firmware_change")

🔗 References

📤 Share & Export