CVE-2023-38095

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to bypass authentication and upload arbitrary files to NETGEAR ProSAFE Network Management System, leading to remote code execution with SYSTEM privileges. Affected installations of NETGEAR ProSAFE Network Management System are vulnerable to complete system compromise.

💻 Affected Systems

Products:
  • NETGEAR ProSAFE Network Management System
Versions: Versions prior to 1.7.0.22
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Authentication is required but can be bypassed. The vulnerability exists in the MFileUploadController class.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with SYSTEM privileges, allowing attacker to install malware, exfiltrate data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to installation of backdoors, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, file upload restrictions, and authentication hardening are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Authentication bypass required but documented. ZDI-CAN-19717 reference suggests detailed exploitation knowledge exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.0.22

Vendor Advisory: https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025

Restart Required: Yes

Instructions:

1. Download version 1.7.0.22 from NETGEAR support portal. 2. Backup current configuration. 3. Install the update following NETGEAR's upgrade guide. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict File Upload Access

linux

Block access to file upload endpoints at network perimeter

iptables -A INPUT -p tcp --dport [NMS_PORT] -m string --string "MFileUploadController" --algo bm -j DROP

Network Segmentation

all

Isolate NMS system from internet and restrict internal access

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the NMS system
  • Deploy web application firewall with file upload restrictions and authentication bypass detection

🔍 How to Verify

Check if Vulnerable:

Check NMS version in web interface or via system information. Versions below 1.7.0.22 are vulnerable.

Check Version:

Check web interface at https://[NMS_IP]:[PORT]/system/info or equivalent endpoint

Verify Fix Applied:

Verify version shows 1.7.0.22 or higher in system information. Test file upload functionality with malicious payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to MFileUploadController endpoints
  • Authentication bypass attempts
  • Unexpected SYSTEM privilege processes

Network Indicators:

  • POST requests to file upload endpoints with unusual file extensions
  • Traffic patterns indicating file uploads followed by command execution

SIEM Query:

source="NMS" AND (uri="*MFileUploadController*" OR process="cmd.exe" OR process="powershell.exe")

🔗 References

📤 Share & Export