CVE-2022-27644

8.8 HIGH

📋 TL;DR

CVE-2022-27644 is a certificate validation vulnerability in NETGEAR R6700v3 routers that allows network-adjacent attackers to intercept HTTPS downloads. This can lead to arbitrary code execution as root when combined with other vulnerabilities. Affected users are those with vulnerable NETGEAR router installations.

💻 Affected Systems

Products:
  • NETGEAR R6700v3
Versions: 1.0.4.120_10.0.91 and earlier
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects R6700v3 model, not other R6700 variants. Authentication not required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers on the same network can intercept HTTPS traffic, inject malicious files, and achieve remote code execution with root privileges, potentially taking full control of the router.

🟠

Likely Case

Attackers intercepting router update traffic or other HTTPS downloads to deliver malicious payloads, leading to router compromise and network infiltration.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the router itself rather than the entire network.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires network adjacency and combination with other vulnerabilities for full code execution. ZDI-CAN-15797 reference suggests detailed research exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4.122_10.0.92 or later

Vendor Advisory: https://kb.netgear.com/000064721/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0324

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Disable remote management

all

Prevents external exploitation attempts by disabling remote administration features

Network segmentation

all

Isolate router management interface from general user network

🧯 If You Can't Patch

  • Replace router with non-vulnerable model
  • Implement strict network access controls to limit who can access router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under Advanced > Administration > Firmware Update

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Confirm firmware version is 1.0.4.122_10.0.92 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTPS download failures
  • Unexpected firmware update attempts
  • Certificate validation errors in router logs

Network Indicators:

  • Man-in-the-middle attacks targeting router HTTPS traffic
  • Unusual ARP or DNS spoofing activity near router

SIEM Query:

Not applicable for typical home router deployments

🔗 References

📤 Share & Export