CVE-2021-45502

9.6 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication on affected NETGEAR WiFi systems, potentially gaining unauthorized access to router administration interfaces. It affects specific NETGEAR Orbi and Nighthawk mesh WiFi systems running vulnerable firmware versions. Attackers could exploit this without valid credentials to compromise network security.

💻 Affected Systems

Products:
  • NETGEAR CBR750
  • NETGEAR RBK752
  • NETGEAR RBR750
  • NETGEAR RBS750
  • NETGEAR RBK852
  • NETGEAR RBR850
  • NETGEAR RBS850
Versions: CBR750 before 4.6.3.6; RBK752/RBR750/RBS750/RBK852/RBR850/RBS850 before 3.2.17.12
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both router and satellite units in mesh systems. All devices with vulnerable firmware are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise allowing attacker to reconfigure router settings, intercept traffic, deploy malware to connected devices, and use the network as a pivot point for further attacks.

🟠

Likely Case

Unauthorized access to router admin panel leading to network configuration changes, DNS hijacking, or credential theft from connected devices.

🟢

If Mitigated

Limited impact if network segmentation isolates management interfaces and strong network monitoring detects unauthorized access attempts.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and this authentication bypass could be exploited remotely if management interfaces are exposed.
🏢 Internal Only: MEDIUM - Even without internet exposure, attackers on the local network could exploit this vulnerability to gain administrative access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity. While no public PoC is confirmed, such vulnerabilities are often weaponized quickly in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CBR750: 4.6.3.6 or later; Other models: 3.2.17.12 or later

Vendor Advisory: https://kb.netgear.com/000064126/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0473

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot router after update completes. 5. Verify firmware version matches patched versions.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router admin interface by disabling remote management features.

Network Segmentation

all

Isolate router management interface to dedicated VLAN or restrict access to trusted IP addresses only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach router management interfaces
  • Enable detailed logging and monitoring for unauthorized access attempts to admin interfaces

🔍 How to Verify

Check if Vulnerable:

Access router admin interface and check firmware version under Advanced > Administration > Firmware Update or similar menu.

Check Version:

No CLI command; check via web interface at router IP (typically 192.168.1.1 or 192.168.0.1)

Verify Fix Applied:

Confirm firmware version is CBR750: 4.6.3.6 or higher; Other models: 3.2.17.12 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to admin login pages
  • Successful admin logins from unexpected IP addresses
  • Configuration changes without authorized user activity

Network Indicators:

  • HTTP/HTTPS requests to router admin interface from unauthorized sources
  • Unusual traffic patterns to router management ports

SIEM Query:

source_ip NOT IN (trusted_admin_ips) AND (url CONTAINS '/login.htm' OR url CONTAINS '/BASIC_login.htm') AND response_code=200

🔗 References

📤 Share & Export