CVE-2020-35226

7.1 HIGH

📋 TL;DR

CVE-2020-35226 allows unauthenticated attackers to modify DHCP configuration on affected NETGEAR switches. This vulnerability enables unauthorized network changes without credentials. It affects NETGEAR JGS516PE and GS116Ev2 switches running vulnerable firmware.

💻 Affected Systems

Products:
  • NETGEAR JGS516PE
  • NETGEAR GS116Ev2
Versions: v2.6.0.43
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects switches with web management interface accessible. Physical access or network access to management interface required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect all DHCP traffic to malicious servers, enabling man-in-the-middle attacks, credential theft, and network disruption.

🟠

Likely Case

Unauthorized DHCP server configuration leading to IP address conflicts, network instability, and potential traffic interception.

🟢

If Mitigated

Limited impact if switches are isolated from untrusted networks and proper network segmentation is implemented.

🌐 Internet-Facing: HIGH - Directly exposed switches can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices could exploit this to disrupt network operations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific HTTP POST requests to the switch management interface. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.6.0.48 or later

Vendor Advisory: https://kb.netgear.com/000062641/Security-Advisory-for-Unauthenticated-DHCP-Configuration-Change-on-Some-Switches-PSV-2020-0218

Restart Required: Yes

Instructions:

1. Download latest firmware from NETGEAR support site. 2. Log into switch web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload and install new firmware. 5. Reboot switch.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to switch management interface to trusted IP addresses only

Configure ACLs to restrict HTTP/HTTPS access to management IP

Disable Web Management

all

Use CLI management only if web interface not required

no ip http server
no ip http secure-server

🧯 If You Can't Patch

  • Isolate switches on dedicated management VLAN with strict access controls
  • Implement network monitoring for unauthorized DHCP configuration changes

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > Information > Firmware Version

Check Version:

show version (via CLI) or check web interface System Information page

Verify Fix Applied:

Confirm firmware version is v2.6.0.48 or later and test DHCP configuration changes require authentication

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to /DHCPCfg.html
  • Unexpected DHCP configuration changes in system logs

Network Indicators:

  • Unusual HTTP traffic to switch management interface from unauthorized sources
  • Multiple DHCP servers responding on network

SIEM Query:

source_ip NOT IN trusted_networks AND dest_port=80 AND uri_path="/DHCPCfg.html" AND http_method="POST"

🔗 References

📤 Share & Export