CVE-2021-37567

8.2 HIGH

📋 TL;DR

This vulnerability in MediaTek wireless chipsets allows attackers to perform out-of-bounds reads via mishandled IEEE 1905 protocol packets. It affects NETGEAR and other devices using specified MediaTek chipsets, potentially exposing sensitive memory contents. The vulnerability requires network access to the affected wireless interface.

💻 Affected Systems

Products:
  • NETGEAR devices with specified MediaTek chipsets
  • Other devices using MediaTek MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915 chipsets
Versions: Software versions up to and including 2.0.2
Operating Systems: Embedded firmware on affected devices
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have IEEE 1905 protocol enabled and be using affected MediaTek chipsets. The vulnerability is in the chipset firmware, not the host operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of sensitive memory contents, potentially including authentication credentials, encryption keys, or other system data that could lead to further compromise.

🟠

Likely Case

Information leakage of adjacent memory contents, which could reveal system information or partial data that aids attackers in reconnaissance.

🟢

If Mitigated

No impact if proper network segmentation and access controls prevent unauthorized access to wireless interfaces.

🌐 Internet-Facing: MEDIUM - Devices with exposed wireless interfaces could be targeted, but exploitation requires specific IEEE 1905 protocol access.
🏢 Internal Only: MEDIUM - Internal attackers with network access to affected wireless interfaces could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted IEEE 1905 protocol packets to the vulnerable wireless interface. No authentication is required, but attackers need network access to the interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.0.2

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/January-2022

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Download latest firmware from vendor website. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to activate patched firmware.

🔧 Temporary Workarounds

Disable IEEE 1905 protocol

all

Disable the IEEE 1905 protocol if not required for network functionality

Check device web interface or CLI for IEEE 1905/EasyMesh settings

Network segmentation

all

Isolate affected wireless interfaces from untrusted networks

Configure VLANs to separate wireless traffic
Implement firewall rules to restrict access to wireless interfaces

🧯 If You Can't Patch

  • Segment affected devices on isolated network segments
  • Implement strict firewall rules to limit access to wireless management interfaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version and chipset model. If using MediaTek MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, or MT7915 with firmware version 2.0.2 or earlier, device is vulnerable.

Check Version:

Check device web interface or use manufacturer-specific CLI commands (varies by device)

Verify Fix Applied:

Verify firmware version is updated to version after 2.0.2. Check vendor patch notes for specific fixed versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual IEEE 1905 protocol traffic
  • Memory access errors in system logs
  • Unexpected device reboots or instability

Network Indicators:

  • Unusual IEEE 1905 protocol packets to wireless interfaces
  • Traffic patterns suggesting reconnaissance of wireless interfaces

SIEM Query:

Search for IEEE 1905 protocol anomalies or memory access errors in device logs

🔗 References

📤 Share & Export