CVE-2021-45493

7.6 HIGH

📋 TL;DR

This vulnerability allows attackers to obtain administrative credentials on affected NETGEAR routers. It affects RAX35, RAX38, and RAX40 routers running firmware versions before 1.0.4.102. Successful exploitation could lead to complete router compromise.

💻 Affected Systems

Products:
  • NETGEAR RAX35
  • NETGEAR RAX38
  • NETGEAR RAX40
Versions: All versions before 1.0.4.102
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configurations. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full router takeover allowing traffic interception, network pivoting, DNS hijacking, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to router administration panel leading to configuration changes, network disruption, and credential theft.

🟢

If Mitigated

Limited impact if strong network segmentation and monitoring are in place, though router compromise remains possible.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access, though external attacks are more likely.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Credential disclosure vulnerabilities are typically easy to exploit once discovered. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4.102 or later

Vendor Advisory: https://kb.netgear.com/000064453/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-Routers-PSV-2019-0293

Restart Required: Yes

Instructions:

1. Log into router admin panel. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install version 1.0.4.102 or later. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external access to router admin interface

Change Admin Credentials

all

Change default/admin passwords to strong, unique credentials

🧯 If You Can't Patch

  • Replace affected routers with patched models or different vendors
  • Implement network segmentation to isolate router management traffic

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin panel: Advanced > Administration > Firmware Update

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Confirm firmware version is 1.0.4.102 or higher in router admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login attempts
  • Configuration changes from unknown IPs
  • Failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected traffic to router admin port (typically 80/443)
  • Traffic patterns suggesting credential harvesting

SIEM Query:

source_ip=router_ip AND (event_type="authentication" OR event_type="configuration_change")

🔗 References

📤 Share & Export