CVE-2023-27370
📋 TL;DR
This vulnerability allows network-adjacent attackers to bypass authentication and access plaintext configuration secrets stored on NETGEAR RAX30 routers. Attackers can steal stored credentials like admin passwords, potentially leading to full router compromise. Only users of affected NETGEAR RAX30 routers are impacted.
💻 Affected Systems
- NETGEAR RAX30
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full administrative control of router, can intercept all network traffic, install malware on connected devices, and pivot to internal network systems.
Likely Case
Attacker steals router admin credentials, changes configuration to redirect DNS or intercept traffic, potentially compromising user accounts and sensitive data.
If Mitigated
With proper network segmentation and monitoring, impact limited to isolated router compromise without lateral movement to critical systems.
🎯 Exploit Status
Authentication bypass required but documented. Plaintext credential extraction is straightforward once bypassed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V1.0.10.94 or later
Vendor Advisory: https://kb.netgear.com/000065619/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0348
Restart Required: Yes
Instructions:
1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install V1.0.10.94 or later. 4. Reboot router after update completes.
🔧 Temporary Workarounds
Network Segmentation
allIsolate router management interface to separate VLAN with strict access controls.
Access Restriction
allConfigure firewall rules to restrict access to router admin interface to trusted IP addresses only.
🧯 If You Can't Patch
- Replace router with patched model or different vendor
- Implement network monitoring for unauthorized configuration changes and credential extraction attempts
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface under Advanced > Administration > Firmware Update. If version is below V1.0.10.94, device is vulnerable.
Check Version:
curl -k https://routerlogin.net | grep firmware version (requires admin access)
Verify Fix Applied:
Confirm firmware version shows V1.0.10.94 or higher after update. Test authentication bypass attempts should fail.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful configuration access
- Unusual configuration export or backup operations
Network Indicators:
- Unusual HTTP requests to configuration endpoints from non-admin IPs
- Traffic patterns suggesting credential extraction
SIEM Query:
source="router" AND (event="config_access" OR event="auth_bypass")
🔗 References
- https://kb.netgear.com/000065619/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0348
- https://www.zerodayinitiative.com/advisories/ZDI-23-501/
- https://kb.netgear.com/000065619/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0348
- https://www.zerodayinitiative.com/advisories/ZDI-23-501/