CVE-2020-35231

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication controls in NETGEAR switches by exploiting flaws in the NSDP protocol implementation. Attackers can gain full administrative control of affected devices. This affects NETGEAR JGS516PE and GS116Ev2 switches running vulnerable firmware.

💻 Affected Systems

Products:
  • NETGEAR JGS516PE
  • NETGEAR GS116Ev2
Versions: v2.6.0.43
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with NSDP protocol enabled (typically enabled by default for management).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network switch allowing traffic interception, VLAN hopping, network segmentation bypass, and persistent backdoor access to the entire network segment.

🟠

Likely Case

Unauthorized administrative access to switch configuration, enabling network reconnaissance, traffic redirection, and denial of service attacks.

🟢

If Mitigated

Limited impact if switches are isolated in management VLANs with strict access controls, though authentication bypass still presents significant risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Technical details and proof-of-concept are publicly available in NCC Group advisory. Exploitation requires network access to the switch management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.6.0.48 or later

Vendor Advisory: https://kb.netgear.com/000062641/Security-Advisory-for-Authentication-Bypass-on-Some-Smart-Managed-Plus-Switches-PSV-2020-0220

Restart Required: Yes

Instructions:

1. Download latest firmware from NETGEAR support site. 2. Log into switch web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload and install new firmware. 5. Reboot switch after installation completes.

🔧 Temporary Workarounds

Disable NSDP Protocol

all

Disable the vulnerable NSDP protocol if not required for network operations.

Configure via web interface: System > Management > NSDP > Disable

Restrict Management Access

all

Limit management interface access to trusted IP addresses only.

Configure via web interface: System > Management > Access Control > Add trusted IP ranges

🧯 If You Can't Patch

  • Isolate affected switches in dedicated management VLAN with strict firewall rules
  • Implement network segmentation to limit lateral movement if switch is compromised

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > Management > Firmware Version. If version is v2.6.0.43 or earlier, device is vulnerable.

Check Version:

Web interface: System > Management > Firmware Version

Verify Fix Applied:

Verify firmware version is v2.6.0.48 or later after patching. Test authentication controls by attempting unauthorized NSDP protocol access.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized authentication attempts via NSDP
  • Unexpected configuration changes
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • NSDP protocol traffic from unauthorized sources
  • Unexpected management traffic patterns
  • Port scanning targeting switch management interfaces

SIEM Query:

source_ip=* AND destination_port=63322 AND protocol=UDP AND (event_type="authentication_failure" OR event_type="configuration_change")

🔗 References

📤 Share & Export