CVE-2020-35223

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass CSRF protection in NETGEAR JGS516PE and GS116Ev2 switches by omitting the CSRF token parameter in HTTP requests. This could enable unauthorized administrative actions on affected devices. Organizations using these specific NETGEAR switch models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • NETGEAR JGS516PE
  • NETGEAR GS116Ev2
Versions: v2.6.0.43
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with web administration panel enabled. Requires network access to management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network switch configuration, enabling VLAN hopping, traffic interception, network segmentation bypass, or device bricking.

🟠

Likely Case

Unauthorized configuration changes, network disruption, or credential theft through crafted admin panel requests.

🟢

If Mitigated

Limited impact if network segmentation isolates management interfaces and strong authentication is enforced.

🌐 Internet-Facing: HIGH if web admin panel is exposed to internet, as exploit requires no authentication.
🏢 Internal Only: MEDIUM if management interface is accessible on internal network, requiring attacker to be on same network segment.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to management interface but no authentication. CSRF token omission is trivial to implement in attack scripts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.6.0.48 or later

Vendor Advisory: https://kb.netgear.com/000062641/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-Switches-PSV-2020-0223

Restart Required: Yes

Instructions:

1. Download latest firmware from NETGEAR support site. 2. Log into switch web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload new firmware file. 5. Wait for upgrade to complete and device to reboot.

🔧 Temporary Workarounds

Disable web administration interface

all

Disable HTTP/HTTPS management access and use CLI or other management methods

CLI: configure terminal
CLI: no ip http server
CLI: no ip http secure-server

Network segmentation

all

Isolate switch management interface to dedicated VLAN with strict access controls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management interfaces
  • Deploy web application firewall with CSRF protection rules
  • Monitor for unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Information) or CLI (show version). If version is exactly v2.6.0.43, device is vulnerable.

Check Version:

CLI: show version | include Software

Verify Fix Applied:

Verify firmware version is v2.6.0.48 or later. Test CSRF protection by attempting to submit admin actions without valid token.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to admin endpoints missing CSRF tokens
  • Unexpected configuration changes in switch logs
  • Multiple failed login attempts followed by successful admin actions

Network Indicators:

  • HTTP POST requests to /login.cgi or other admin endpoints without referrer headers
  • Traffic from unexpected sources to switch management IP on port 80/443

SIEM Query:

source="switch_logs" AND (uri_path="/login.cgi" OR uri_path="/apply.cgi") AND NOT csrf_token=*

🔗 References

📤 Share & Export