First published: Thu Dec 30 2021(Updated: )
Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rax43 Firmware | =1.0.3.96 | |
Netgear RAX43 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of the Netgear RAX43 is CVE-2021-20168.
The severity of CVE-2021-20168 is high, with a severity value of 6.8.
Netgear RAX43 version 1.0.3.96 is affected by CVE-2021-20168.
A malicious actor with physical access to the device can connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user.
Yes, Netgear RAX43 version 1.0.3.96 is vulnerable to CVE-2021-20168.