CVE-2020-35229

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers with network access to reuse authentication tokens indefinitely on affected NETGEAR switches, effectively bypassing authentication and gaining administrative privileges. It affects NETGEAR JGS516PE and GS116Ev2 switches running vulnerable firmware versions. Attackers need to capture network traffic containing a valid token to exploit this flaw.

💻 Affected Systems

Products:
  • NETGEAR JGS516PE
  • NETGEAR GS116Ev2
Versions: v2.6.0.43 and earlier
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using NSDP protocol for management. Requires attacker to have network access to capture authentication traffic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative compromise of the switch allowing configuration changes, traffic interception, network disruption, and potential lateral movement to other network devices.

🟠

Likely Case

Unauthorized administrative access to the switch enabling configuration changes, VLAN manipulation, and network monitoring.

🟢

If Mitigated

Limited impact if switches are isolated from untrusted networks and proper network segmentation is in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires capturing a valid authentication token from network traffic, then reusing it in subsequent requests. No authentication bypass for initial token acquisition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.6.0.44 or later

Vendor Advisory: https://kb.netgear.com/000062641/Security-Advisory-for-Authentication-Token-Reuse-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0213

Restart Required: Yes

Instructions:

1. Log into NETGEAR support portal. 2. Download firmware v2.6.0.44 or later. 3. Upload firmware to switch via web interface. 4. Reboot switch after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate switch management interfaces from untrusted networks and user VLANs

Disable Unnecessary Protocols

all

Disable NSDP protocol if not required for management

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach switch management interfaces
  • Monitor network traffic for unusual NSDP protocol activity and token reuse patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > Maintenance > Firmware Update. If version is v2.6.0.43 or earlier, device is vulnerable.

Check Version:

No CLI command available. Use web interface: System > Maintenance > Firmware Update

Verify Fix Applied:

After patching, verify firmware version shows v2.6.0.44 or later. Test that authentication tokens expire properly after use.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful administrative actions from same IP with same token
  • Unusual configuration changes from unexpected sources

Network Indicators:

  • Repeated NSDP protocol requests with same authentication token
  • NSDP traffic from unauthorized network segments

SIEM Query:

source_ip=* AND protocol=NSDP AND auth_token=* GROUP BY auth_token COUNT > 1

🔗 References

📤 Share & Export