First published: Sun Nov 01 2020(Updated: )
The SIP ALG implementation on NETGEAR Nighthawk R7000 1.0.9.64_10.2.64 devices allows remote attackers to communicate with arbitrary TCP and UDP services on a victim's intranet machine, if the victim visits an attacker-controlled web site with a modern browser, aka NAT Slipstreaming. This occurs because the ALG takes action based on an IP packet with an initial REGISTER substring in the TCP data, and the correct intranet IP address in the subsequent Via header, without properly considering that connection progress and fragmentation affect the meaning of the packet data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Nighthawk R7000 Firmware | =1.0.9.64_10.2.64 | |
Netgear Nighthawk R7000 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28041 is considered a critical vulnerability due to its potential to allow remote attackers to exploit internal networks.
To mitigate CVE-2020-28041, update the firmware of your NETGEAR Nighthawk R7000 device to the latest version.
CVE-2020-28041 affects NETGEAR Nighthawk R7000 devices running firmware version 1.0.9.64_10.2.64.
Yes, CVE-2020-28041 can be exploited remotely if the victim navigates to a malicious website.
NAT Slipstreaming in CVE-2020-28041 refers to the technique that allows attackers to bypass firewall protection and access internal services.