CVE-2021-40866

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to change the admin password on affected NETGEAR smart switches by sending specially crafted NSDP packets to the sccd daemon. The flaw occurs because the daemon fails to check authentication when the authentication TLV is missing from packets. This affects multiple NETGEAR smart switch models running vulnerable firmware versions.

💻 Affected Systems

Products:
  • GC108P
  • GC108PP
  • GS108Tv3
  • GS110TPP
  • GS110TPv3
  • GS110TUP
  • GS308T
  • GS310TP
  • GS710TUP
  • GS716TP
  • GS716TPP
  • GS724TPP
  • GS724TPv2
  • GS728TPPv2
  • GS728TPv2
  • GS750E
  • GS752TPP
  • GS752TPv2
  • MS510TXM
  • MS510TXUP
Versions: Versions before: GC108P/GC108PP 1.0.8.2, GS108Tv3/GS110TPP/GS110TPv3 7.0.7.2, GS110TUP/GS710TUP 1.0.5.3, GS308T/GS310TP 1.0.3.2, GS716TP/GS716TPP 1.0.4.2, GS724TPP/GS724TPv2 2.0.6.3, GS728TPPv2/GS728TPv2/GS752TPP/GS752TPv2 6.0.8.2, GS750E 1.0.1.10, MS510TXM/MS510TXUP 1.0.4.2
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable sccd daemon is disabled by default but may be enabled in some configurations. Affects switches with vulnerable firmware regardless of daemon state.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network switching infrastructure, allowing attackers to reconfigure VLANs, intercept traffic, disable ports, or use the switch as a pivot point to attack other network segments.

🟠

Likely Case

Unauthorized admin access to switches, enabling network reconnaissance, traffic manipulation, and potential denial of service through configuration changes.

🟢

If Mitigated

Limited impact if switches are properly segmented, have restricted management interfaces, and are monitored for unauthorized configuration changes.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and affects network infrastructure devices that may be exposed to the internet for management.
🏢 Internal Only: HIGH - Even internally, unauthenticated attackers on the same network segment can exploit this to gain administrative control of switches.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted NSDP packets to UDP port 63322. Public proof-of-concept code exists demonstrating the attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See affected_systems.versions for specific fixed versions per model

Vendor Advisory: https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145

Restart Required: Yes

Instructions:

1. Identify affected switch models and current firmware versions. 2. Download appropriate firmware updates from NETGEAR support site. 3. Upload firmware to switch via web interface or CLI. 4. Apply update and reboot switch.

🔧 Temporary Workarounds

Disable sccd daemon

all

Disable the vulnerable sccd daemon if not required for network operations

Configuration varies by model - consult NETGEAR documentation for CLI/web interface commands to disable sccd

Restrict management access

all

Limit access to switch management interfaces to trusted IP addresses only

Configure ACLs to restrict access to UDP port 63322 and other management ports

🧯 If You Can't Patch

  • Segment switches on isolated management VLANs with strict access controls
  • Implement network monitoring for unauthorized NSDP traffic and configuration changes

🔍 How to Verify

Check if Vulnerable:

Check switch firmware version via web interface (System Information) or CLI (show version) and compare against patched versions listed in affected_systems.versions

Check Version:

CLI: show version | include Firmware

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in affected_systems.versions

📡 Detection & Monitoring

Log Indicators:

  • Unexpected admin password changes
  • Unauthorized configuration modifications
  • Failed authentication attempts followed by successful admin actions

Network Indicators:

  • NSDP packets (UDP 63322) from unauthorized sources
  • Unusual traffic patterns to/from switch management interfaces

SIEM Query:

Example: (destination_port:63322 AND protocol:UDP) OR (event_type:"password change" AND device_type:"switch")

🔗 References

📤 Share & Export