CVE-2021-27276

7.1 HIGH

📋 TL;DR

This vulnerability in NETGEAR ProSAFE Network Management System allows authenticated attackers to bypass authentication and delete arbitrary files via path traversal in the realName parameter. It affects NETGEAR NMS300 installations, potentially causing denial-of-service by deleting critical system files. Attackers with network access to the management interface can exploit this.

💻 Affected Systems

Products:
  • NETGEAR ProSAFE Network Management System 300 (NMS300)
Versions: Version 1.6.0.26
Operating Systems: Windows-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the NMS300 appliance running the vulnerable software version. Authentication is required but can be bypassed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical operating system files, rendering the device inoperable and requiring physical restoration.

🟠

Likely Case

Denial-of-service by deleting configuration files or application components, disrupting network management capabilities.

🟢

If Mitigated

Limited impact with proper network segmentation and authentication controls, though authentication bypass makes this challenging.

🌐 Internet-Facing: HIGH - The NMS system is typically exposed for remote management, and authentication bypass enables exploitation.
🏢 Internal Only: HIGH - Even internally, the authentication bypass allows any network user to potentially exploit the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Authentication bypass exists, making exploitation straightforward once the vulnerability is understood. ZDI published advisory with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.7.0.22 or later

Vendor Advisory: https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500

Restart Required: Yes

Instructions:

1. Download the latest firmware from NETGEAR support site. 2. Backup current configuration. 3. Apply firmware update through web interface. 4. Reboot the appliance. 5. Verify version is 1.7.0.22 or higher.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to NMS300 management interface to trusted administrative networks only.

Configure firewall rules to allow only specific IP ranges to access NMS300 web interface (typically port 80/443)

Authentication Hardening

all

Implement additional authentication layers or IP-based restrictions.

Configure web server to require client certificate authentication or implement reverse proxy with additional auth

🧯 If You Can't Patch

  • Isolate the NMS300 appliance on a dedicated management VLAN with strict firewall rules
  • Implement network monitoring for unusual file deletion patterns or authentication bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check web interface login page for version information, or SSH into appliance and check version files.

Check Version:

ssh admin@nms-ip 'cat /etc/version' or check web interface → System → About

Verify Fix Applied:

Verify version is 1.7.0.22 or higher in web interface or via SSH version check.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in system logs
  • Authentication bypass attempts in web server logs
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • HTTP POST requests to MibController with path traversal patterns in realName parameter
  • Unusual file deletion operations from NMS300 IP

SIEM Query:

source="nms300_logs" AND (event="file_deletion" OR param="realName" AND value CONTAINS "../")

🔗 References

📤 Share & Export