CVE-2020-35221

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers who capture network traffic to crack passwords on affected NETGEAR switches by exploiting weak hashing in the NSDP authentication protocol. Attackers can generate password collisions or infer password parts, potentially gaining administrative access. Organizations using these specific NETGEAR switch models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • NETGEAR ProSAFE Plus JGS516PE
  • NETGEAR ProSAFE Plus GS116Ev2
Versions: v2.6.0.43
Operating Systems: Switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices using NSDP (Network Smart Discovery Protocol) for password authentication. Other authentication methods may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative compromise of network switches, enabling network traffic interception, configuration changes, VLAN manipulation, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized administrative access to switches, allowing network disruption, configuration tampering, and credential harvesting from network traffic.

🟢

If Mitigated

Limited impact if switches are isolated, network monitoring detects unusual authentication attempts, and strong perimeter controls prevent external access.

🌐 Internet-Facing: HIGH if switches have management interfaces exposed to the internet, as attackers could capture authentication traffic remotely.
🏢 Internal Only: MEDIUM as attackers need network access to capture authentication packets, but once inside they could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network packet capture capability. The NCC Group research includes technical details that could be used to create exploit tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NETGEAR for latest firmware updates

Vendor Advisory: https://kb.netgear.com/000062641/Security-Advisory-for-Password-Hashing-Vulnerability-on-Some-Switches-PSV-2020-0221

Restart Required: Yes

Instructions:

1. Log into switch management interface. 2. Navigate to firmware update section. 3. Download latest firmware from NETGEAR support site. 4. Upload and apply firmware update. 5. Reboot switch after update completes.

🔧 Temporary Workarounds

Disable NSDP authentication

all

Use alternative authentication methods if available in switch configuration

Network segmentation

all

Isolate switch management interfaces to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to prevent unauthorized access to switch management interfaces
  • Enable comprehensive logging and monitoring for authentication attempts and configuration changes

🔍 How to Verify

Check if Vulnerable:

Check switch firmware version via web interface or CLI. If version is v2.6.0.43 on affected models, device is vulnerable.

Check Version:

Via web interface: System Information page. Via CLI: 'show version' or similar command depending on switch model.

Verify Fix Applied:

Verify firmware version has been updated to a version later than v2.6.0.43. Check NETGEAR advisory for specific patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Unexpected successful logins from unusual IPs
  • Configuration changes from unauthorized users

Network Indicators:

  • Unusual NSDP protocol traffic patterns
  • Packet capture tools running on network segments with switches

SIEM Query:

source="switch_logs" AND (event_type="authentication" AND result="success" AND user NOT IN authorized_users) OR (event_type="configuration_change" AND user NOT IN admin_users)

🔗 References

📤 Share & Export