CVE-2020-35802

7.5 HIGH

📋 TL;DR

This vulnerability in certain NETGEAR routers and WiFi systems allows unauthorized disclosure of sensitive information. Attackers can potentially access confidential data stored on affected devices. The vulnerability impacts multiple NETGEAR models running outdated firmware versions.

💻 Affected Systems

Products:
  • NETGEAR CBR40
  • RBW30
  • RAX75
  • RAX80
  • RBK752
  • RBR750
  • RBS750
  • RBK852
  • RBR850
  • RBS850
  • RBK842
  • RBR840
  • RBS840
  • RBS40V
Versions: CBR40 before 2.5.0.14, RBW30 before 2.6.1.4, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBS40V before 2.6.1.4
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions of listed NETGEAR devices. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive configuration data, credentials, or network information that could lead to complete network compromise.

🟠

Likely Case

Unauthorized access to device configuration details, potentially exposing network topology or administrative information.

🟢

If Mitigated

Limited information disclosure with no critical credentials exposed due to proper network segmentation and access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory indicates information disclosure that could be exploited without authentication, suggesting relatively simple exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CBR40 2.5.0.14+, RBW30 2.6.1.4+, RAX75 1.0.3.102+, RAX80 1.0.3.102+, RBK752/RBR750/RBS750 3.2.16.6+, RBK852/RBR850/RBS850 3.2.16.6+, RBK842/RBR840/RBS840 3.2.16.6+, RBS40V 2.6.1.4+

Vendor Advisory: https://kb.netgear.com/000062720/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-and-WiFi-Systems-PSV-2020-0331

Restart Required: Yes

Instructions:

1. Log into NETGEAR router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install the latest firmware. 4. Reboot the device after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from critical network segments to limit potential data exposure.

Access Control Restrictions

all

Implement strict firewall rules to limit access to router management interfaces.

🧯 If You Can't Patch

  • Replace affected devices with patched models or alternative vendors
  • Implement network monitoring to detect unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check current firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

Check via router web interface or use manufacturer's mobile app

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to router management interfaces
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unexpected traffic to router management ports
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (event="unauthorized_access" OR event="configuration_access")

🔗 References

📤 Share & Export