CVE-2022-40620

7.7 HIGH

📋 TL;DR

This vulnerability allows attackers to intercept unencrypted update requests and deliver malicious packages to affected NETGEAR routers and Orbi WiFi systems, enabling arbitrary code execution. It affects specific models running outdated firmware versions. The flaw exists in the FunJSQ third-party module's failure to properly validate TLS certificates during auto-updates.

💻 Affected Systems

Products:
  • NETGEAR R6230
  • NETGEAR R6260
  • NETGEAR R7000
  • NETGEAR R8900
  • NETGEAR R9000
  • NETGEAR XR300
  • Orbi RBR20
  • Orbi RBR50
  • Orbi RBS20
  • Orbi RBS50
Versions: R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, XR300 before 1.0.3.72, Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, RBS50 before 2.7.4.26
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration with FunJSQ module enabled. Requires attacker to be on same network segment.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with persistent backdoor installation, allowing complete network surveillance, credential theft, and lateral movement to connected devices.

🟠

Likely Case

Local network attacker gains router administrative access, enabling DNS hijacking, traffic interception, and network disruption.

🟢

If Mitigated

Attack prevented through network segmentation and proper certificate validation.

🌐 Internet-Facing: LOW (requires local network access for exploitation)
🏢 Internal Only: HIGH (attackers on the same network can exploit without authentication)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires man-in-the-middle position on local network. No authentication needed to trigger update request.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R6230: 1.1.0.112+, R6260: 1.1.0.88+, R7000: 1.0.11.134+, R8900: 1.0.5.42+, R9000: 1.0.5.42+, XR300: 1.0.3.72+, Orbi RBR20: 2.7.2.26+, RBR50: 2.7.4.26+, RBS20: 2.7.2.26+, RBS50: 2.7.4.26+

Vendor Advisory: https://kb.netgear.com/000065132/Security-Advisory-for-Vulnerabilities-in-FunJSQ-on-Some-Routers-and-Orbi-WiFi-Systems-PSV-2022-0117

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates. 4. Download and install latest firmware. 5. Reboot router after installation.

🔧 Temporary Workarounds

Disable FunJSQ module

all

Temporarily disable the vulnerable third-party module

Login to router admin panel > Advanced > Advanced Setup > FunJSQ > Disable

Network segmentation

all

Isolate affected routers from critical network segments

🧯 If You Can't Patch

  • Replace affected devices with patched models or different vendors
  • Implement strict network access controls and monitor for suspicious update traffic

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under Advanced > Administration > Router Status

Check Version:

Router-specific: Check via web interface or 'nmap -sV -p 80,443 [router-ip]' to identify model/version

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual update package downloads
  • Failed TLS certificate validation attempts
  • Unexpected firmware modification timestamps

Network Indicators:

  • Unencrypted update traffic to unusual destinations
  • Man-in-the-middle activity on local network
  • DNS queries to update servers without TLS validation

SIEM Query:

source="router-logs" AND (event="firmware_update" OR event="package_download") AND (status="failed" OR dest_ip!="expected_update_server")

🔗 References

📤 Share & Export