CVE-2021-45649

7.9 HIGH

📋 TL;DR

This vulnerability in certain NETGEAR routers allows unauthorized disclosure of sensitive information. Attackers can potentially access confidential data stored on affected devices. Users of specific NETGEAR router models with outdated firmware are at risk.

💻 Affected Systems

Products:
  • NETGEAR R6400v2
  • NETGEAR R6700v3
  • NETGEAR R7000
  • NETGEAR R6900P
  • NETGEAR R7000P
Versions: R6400v2 before 1.0.4.84, R6700v3 before 1.0.4.84, R7000 before 1.0.11.126, R6900P before 1.3.2.126, R7000P before 1.3.2.126
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions only. Devices with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to router configuration, credentials, or network information, leading to complete network compromise or credential theft.

🟠

Likely Case

Unauthorized access to router settings or network information that could facilitate further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-200 indicates information exposure vulnerability, typically requiring network access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R6400v2: 1.0.4.84+, R6700v3: 1.0.4.84+, R7000: 1.0.11.126+, R6900P: 1.3.2.126+, R7000P: 1.3.2.126+

Vendor Advisory: https://kb.netgear.com/000064073/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-PSV-2019-0123

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Disable remote management

all

Prevents external access to router management interface

Change default credentials

all

Use strong, unique passwords for router admin access

🧯 If You Can't Patch

  • Isolate affected routers from internet-facing networks
  • Implement network segmentation to limit potential data exposure

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under Advanced > Administration > Firmware Update

Check Version:

Check via router web interface or use nmap/router-specific tools to query version

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to router management interface
  • Unusual configuration changes

Network Indicators:

  • Unexpected traffic to router management ports
  • Information disclosure in HTTP responses

SIEM Query:

source="router_logs" AND (event="unauthorized_access" OR event="config_change")

🔗 References

📤 Share & Export