CVE-2020-26901

9.6 CRITICAL

📋 TL;DR

This vulnerability in certain NETGEAR WiFi systems allows unauthorized disclosure of sensitive information. It affects RBK752, RBR750, RBS750, RBK852, RBR850, and RBS850 devices running firmware versions before 3.2.15.25.

💻 Affected Systems

Products:
  • RBK752
  • RBR750
  • RBS750
  • RBK852
  • RBR850
  • RBS850
Versions: Firmware versions before 3.2.15.25
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific NETGEAR Orbi WiFi 6 systems. All devices with vulnerable firmware are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain access to sensitive configuration data, credentials, or network information, potentially leading to full network compromise.

🟠

Likely Case

Unauthorized users accessing sensitive device information that could be used for further attacks or reconnaissance.

🟢

If Mitigated

Limited exposure of non-critical information if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - These are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this if they have network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory indicates information disclosure without authentication, suggesting relatively simple exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.15.25 or later

Vendor Advisory: https://kb.netgear.com/000062353/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2020-0036

Restart Required: Yes

Instructions:

1. Log into your NETGEAR Orbi web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install firmware version 3.2.15.25 or later. 4. Reboot all affected devices after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and limit access to management interfaces.

Access Control

all

Implement strict firewall rules to limit access to device management interfaces.

🧯 If You Can't Patch

  • Isolate affected devices in a separate VLAN with strict access controls
  • Monitor network traffic to/from affected devices for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Orbi web interface under Advanced > Administration > Firmware Update

Check Version:

Check via web interface: Advanced > Administration > Firmware Update

Verify Fix Applied:

Verify firmware version shows 3.2.15.25 or later after update

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to device management interfaces
  • Unusual information requests to device endpoints

Network Indicators:

  • Unusual traffic patterns to device management ports
  • Requests to sensitive information endpoints

SIEM Query:

source_ip=* AND (dest_port=80 OR dest_port=443) AND dest_ip=[device_ip] AND (uri_contains="sensitive" OR uri_contains="config" OR uri_contains="admin")

🔗 References

📤 Share & Export