CVE-2021-45652

9.6 CRITICAL

📋 TL;DR

This vulnerability in NETGEAR Orbi WiFi systems allows unauthorized disclosure of sensitive information from affected devices. It impacts NETGEAR RBK352, RBR350, and RBS350 devices running firmware versions before 4.4.0.10. Attackers could potentially access confidential data without authentication.

💻 Affected Systems

Products:
  • NETGEAR RBK352
  • NETGEAR RBR350
  • NETGEAR RBS350
Versions: Firmware versions before 4.4.0.10
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Orbi WiFi 6 Mesh Systems specifically; other NETGEAR devices are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive configuration data, credentials, or network information that could lead to complete network compromise, lateral movement, or credential theft.

🟠

Likely Case

Unauthorized access to device configuration information, potentially exposing network settings, connected devices, or administrative details.

🟢

If Mitigated

Limited exposure of non-critical information if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows information disclosure without authentication, making exploitation straightforward if the device is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.4.0.10 or later

Vendor Advisory: https://kb.netgear.com/000064152/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-WiFi-Systems-PSV-2021-0013

Restart Required: Yes

Instructions:

1. Log into NETGEAR Orbi web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install firmware version 4.4.0.10 or later. 4. The device will reboot automatically after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and limit access to management interfaces.

Access Control Lists

all

Implement firewall rules to restrict access to device management interfaces.

🧯 If You Can't Patch

  • Remove affected devices from internet-facing positions and place behind firewalls
  • Implement strict network segmentation to limit potential lateral movement

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Orbi web interface under Advanced > Administration > Firmware Update

Check Version:

Not applicable - use web interface

Verify Fix Applied:

Confirm firmware version is 4.4.0.10 or later in the same interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to device management interfaces
  • Multiple failed authentication attempts followed by information requests

Network Indicators:

  • Unexpected HTTP/HTTPS requests to device management ports from unauthorized sources

SIEM Query:

source_ip NOT IN (trusted_networks) AND dest_port IN (80,443,8080) AND dest_ip IN (device_ips) AND http_method IN (GET,POST)

🔗 References

📤 Share & Export