CVE-2021-32468

8.2 HIGH

📋 TL;DR

This vulnerability in MediaTek Wi-Fi chips allows attackers to perform out-of-bounds reads via the WPS protocol, potentially leading to information disclosure or system crashes. It affects NETGEAR devices and other products using specified MediaTek chipsets with firmware version 7.4.0.0. The vulnerability requires proximity to the wireless network but doesn't require authentication.

💻 Affected Systems

Products:
  • NETGEAR devices with MediaTek chipsets
  • Other devices using affected MediaTek chipsets
Versions: 7.4.0.0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have WPS enabled to be vulnerable. Affects chipsets: MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and lateral movement within the network.

🟠

Likely Case

Information disclosure of sensitive memory contents, denial of service through device crashes, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper network segmentation and WPS disabled, potentially only causing temporary service disruption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires proximity to wireless network and WPS protocol knowledge. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor-specific firmware updates

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/January-2022

Restart Required: Yes

Instructions:

1. Check NETGEAR security advisory for affected models. 2. Download latest firmware from vendor website. 3. Apply firmware update through device administration interface. 4. Reboot device after update.

🔧 Temporary Workarounds

Disable WPS

all

Turn off Wi-Fi Protected Setup feature on affected devices

Network Segmentation

all

Isolate affected devices on separate VLANs

🧯 If You Can't Patch

  • Disable WPS functionality immediately
  • Implement strict network access controls and monitor for suspicious WPS traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version and chipset model. If using MediaTek chipsets listed with firmware 7.4.0.0 and WPS enabled, device is vulnerable.

Check Version:

Check device web interface or use vendor-specific CLI commands (varies by device)

Verify Fix Applied:

Verify firmware version has been updated beyond 7.4.0.0 and confirm WPS is disabled or patched.

📡 Detection & Monitoring

Log Indicators:

  • Unusual WPS protocol activity
  • Device crash/reboot logs
  • Memory access violation errors

Network Indicators:

  • Abnormal WPS traffic patterns
  • Multiple WPS connection attempts from single source

SIEM Query:

source="wireless-controller" AND (event="WPS" OR protocol="WPS") AND (count > threshold)

🔗 References

📤 Share & Export