First published: Mon Sep 13 2021(Updated: )
Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear GC108P | <1.0.8.2 | |
Netgear GC108P | ||
Netgear Gc108pp Firmware | <1.0.8.2 | |
Netgear GC108P | ||
Netgear GS108T Firmware | <7.0.7.2 | |
Netgear GS108Ev3 Firmware | ||
Netgear GS110TPP Firmware | <7.0.7.2 | |
Netgear GS110TPP Firmware | ||
Netgear GS110TPP Firmware | <7.0.7.2 | |
Netgear GS110TP Firmware | =v3 | |
Netgear GS110TUP | <1.0.5.3 | |
Netgear GS110TUP Firmware | ||
Netgear GS308T Firmware | <1.0.3.2 | |
Netgear GS308T Firmware | ||
Netgear GS310TP Firmware | <1.0.3.2 | |
Netgear GS310TP Firmware | ||
Netgear GS710TUP | <1.0.5.3 | |
Netgear GS710TUP Firmware | ||
Netgear GS716TP Firmware | <1.0.4.2 | |
Netgear GS716TP Firmware | ||
Netgear GS716TPP Firmware | <1.0.4.2 | |
Netgear GS716TPP Firmware | ||
Netgear GS724TPP Firmware | <2.0.6.3 | |
Netgear GS724TPP Firmware | ||
Netgear GS724TP | <2.0.6.3 | |
Netgear GS724TPv2 | =v2 | |
Netgear GS728TPP Firmware | <6.0.8.2 | |
Netgear GS728TPP Firmware | =v2 | |
Netgear GS728TPP Firmware | <6.0.8.2 | |
Netgear GS728TP Firmware | =v2 | |
Netgear GS750E | <1.0.1.10 | |
Netgear GS750E Firmware | ||
Netgear GS752TPP Firmware | <6.0.8.2 | |
Netgear GS752TPP Firmware | ||
Netgear GS752TP | <6.0.8.2 | |
Netgear GS752TPv2 | =v2 | |
Netgear MS510TXM Firmware | <1.0.4.2 | |
Netgear MS510TXM Firmware | ||
Netgear MS510TxUP | <1.0.4.2 | |
Netgear MS510TXUP Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40866 is a vulnerability in certain NETGEAR smart switches that allows an unauthenticated attacker to remotely change the admin password.
CVE-2021-40866 affects certain NETGEAR smart switches by allowing an unauthenticated attacker to change the admin password remotely.
Versions of NETGEAR smart switches GC108P and GC108PP before 1.0.8.2 are affected by CVE-2021-40866.
CVE-2021-40866 has a severity rating of 8.8 (critical).
You can find more information about CVE-2021-40866 in the following references: [link1](https://gynvael.coldwind.pl/?id=740), [link2](https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145).