CVE-2022-29383

9.8 CRITICAL

📋 TL;DR

This CVE describes a SQL injection vulnerability in NETGEAR ProSafe SSL VPN firmware that allows attackers to execute arbitrary SQL commands via the USERDBDomains.Domainname parameter. The vulnerability affects NETGEAR FVS336Gv2 and FVS336Gv3 SSL VPN devices. Successful exploitation could lead to authentication bypass, data theft, or complete system compromise.

💻 Affected Systems

Products:
  • NETGEAR ProSafe SSL VPN FVS336Gv2
  • NETGEAR ProSafe SSL VPN FVS336Gv3
Versions: All firmware versions prior to patched versions
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface accessible via SSL VPN. Devices must have the vulnerable firmware installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to gain administrative access, steal all VPN credentials, modify device configuration, and pivot to internal networks.

🟠

Likely Case

Authentication bypass leading to unauthorized VPN access, credential theft, and potential lateral movement into corporate networks.

🟢

If Mitigated

Limited impact with proper network segmentation, firewall rules, and monitoring in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the web interface but does not require authentication. Public proof-of-concept code exists in GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NETGEAR security advisory for specific patched versions

Vendor Advisory: https://www.netgear.com/about/security/

Restart Required: Yes

Instructions:

1. Log into NETGEAR support portal. 2. Download latest firmware for your device model. 3. Backup current configuration. 4. Upload and install new firmware via web interface. 5. Reboot device. 6. Verify firmware version.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to VPN management interface using firewall rules

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Isolate vulnerable devices in separate network segment with strict firewall rules
  • Implement network monitoring and IDS/IPS with SQL injection detection signatures

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface under Maintenance > Firmware Upgrade

Check Version:

No CLI command - check via web interface at Maintenance > Firmware Upgrade

Verify Fix Applied:

Verify firmware version matches patched version from NETGEAR advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web logs
  • Multiple failed login attempts followed by successful access
  • Requests to cgi-bin/platform.cgi with SQL-like parameters

Network Indicators:

  • Unusual traffic patterns to VPN management interface
  • SQL injection patterns in HTTP requests

SIEM Query:

source="vpn_firewall" AND (url="*cgi-bin/platform.cgi*" AND (param="*USERDBDomains.Domainname*" OR param="*sql*" OR param="*union*" OR param="*select*"))

🔗 References

📤 Share & Export