CVE-2023-38102

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to bypass authorization checks in NETGEAR ProSAFE Network Management System's createUser function, enabling privilege escalation to administrative resources. Affected installations of NETGEAR ProSAFE NMS are vulnerable to this attack.

💻 Affected Systems

Products:
  • NETGEAR ProSAFE Network Management System
Versions: Versions prior to 1.7.0.34
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the network management system, allowing them to create new admin accounts, modify configurations, and potentially compromise managed network devices.

🟠

Likely Case

Attackers with existing low-privilege accounts escalate to administrative privileges, gaining unauthorized access to sensitive network management functions.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the NMS system itself without lateral movement to managed devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authentication but bypasses authorization checks. Exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.7.0.34

Vendor Advisory: https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025

Restart Required: Yes

Instructions:

1. Download version 1.7.0.34 from NETGEAR support portal. 2. Backup current configuration. 3. Install the update following NETGEAR's installation guide. 4. Restart the NMS service.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate NMS system from general network access

Access Restriction

linux

Restrict access to NMS to trusted IP addresses only

iptables -A INPUT -p tcp --dport [NMS_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [NMS_PORT] -j DROP

🧯 If You Can't Patch

  • Remove all non-essential user accounts from the NMS system
  • Implement strict network access controls and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check NMS version in web interface or via system information. If version is below 1.7.0.34, system is vulnerable.

Check Version:

Check web interface at http://[NMS_IP]/about or examine installed software version in control panel.

Verify Fix Applied:

Verify version shows 1.7.0.34 or higher after update installation.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized createUser API calls
  • User privilege escalation events
  • Multiple failed authentication attempts followed by successful createUser

Network Indicators:

  • HTTP POST requests to createUser endpoint from non-admin accounts
  • Unusual account creation patterns

SIEM Query:

source="nms_logs" AND (event="createUser" OR event="user_created") AND user_role!="admin"

🔗 References

📤 Share & Export