CVE-2021-27273

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to execute arbitrary operating system commands on NETGEAR ProSAFE Network Management System installations. Attackers can bypass authentication mechanisms and exploit improper input validation in the fileName parameter to achieve SYSTEM-level code execution. Organizations using NETGEAR NMS 1.6.0.26 are affected.

💻 Affected Systems

Products:
  • NETGEAR ProSAFE Network Management System (NMS300)
Versions: 1.6.0.26
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication but authentication can be bypassed. Affects the NMS300 hardware appliance running the vulnerable software version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install malware, exfiltrate data, pivot to other systems, or disrupt network operations.

🟠

Likely Case

Unauthorized command execution leading to data theft, network reconnaissance, or installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact if proper network segmentation, authentication hardening, and input validation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Authentication bypass combined with command injection makes exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.0.27 or later

Vendor Advisory: https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559

Restart Required: Yes

Instructions:

1. Download the latest firmware from NETGEAR support site. 2. Log into NMS web interface. 3. Navigate to Administration > Maintenance > Firmware Upgrade. 4. Upload the firmware file and follow upgrade prompts. 5. System will reboot automatically.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to NMS management interface to trusted IP addresses only.

Authentication Hardening

all

Implement strong authentication policies, multi-factor authentication if possible, and monitor for authentication bypass attempts.

🧯 If You Can't Patch

  • Isolate the NMS system on a dedicated management VLAN with strict firewall rules
  • Implement network-based intrusion detection/prevention systems to monitor for command injection patterns

🔍 How to Verify

Check if Vulnerable:

Check the NMS web interface login page or system information for version 1.6.0.26.

Check Version:

Not applicable - check via web interface at https://[nms-ip]:8443/login.jsp

Verify Fix Applied:

Verify the firmware version shows 1.6.0.27 or later in the Administration > Maintenance > Firmware Upgrade section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Unexpected system command execution logs
  • File operations with suspicious parameters in fileName

Network Indicators:

  • HTTP POST requests to /SettingConfigController with unusual fileName parameters
  • Outbound connections from NMS to unexpected destinations

SIEM Query:

source="nms_logs" AND ("SettingConfigController" OR "fileName" OR "command injection")

🔗 References

📤 Share & Export