First published: Wed Mar 29 2023(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-15854.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6700v3 firmware | ||
NETGEAR CAX80 | <2.1.3.7 | |
NETGEAR CAX80 Firmware | ||
NETGEAR LAX20 | <1.1.6.34 | |
NETGEAR LAX20 | ||
NETGEAR MR60 firmware | <1.1.6.124 | |
NETGEAR MR60 firmware | ||
NETGEAR MR80 | <1.1.6.14 | |
NETGEAR Multiple Routers | ||
NETGEAR MS60 | <1.1.6.124 | |
NETGEAR MS60 firmware | ||
NETGEAR MS80 | <1.1.6.14 | |
NETGEAR MS80 | ||
NETGEAR R6400 firmware | <1.0.1.78 | |
NETGEAR R6400 firmware | ||
NETGEAR R6400 firmware | <1.0.4.126 | |
NETGEAR R6400 firmware | =v2 | |
NETGEAR R6700 firmware | <1.0.4.126 | |
NETGEAR R6700v1 firmware | =v3 | |
NETGEAR R6900P Firmware | <1.3.3.148 | |
Netgear R6900 Firmware | ||
NETGEAR Nighthawk R7000 | <1.0.11.134 | |
NETGEAR Nighthawk R7000 | ||
NETGEAR R7000P firmware | <1.3.3.148 | |
Netgear Routers | ||
NETGEAR R7850 Firmware | <1.0.5.84 | |
NETGEAR R7850 firmware | ||
NETGEAR R7900P firmware | <1.4.3.88 | |
NETGEAR R7900P firmware | ||
NETGEAR R7960P firmware | <1.4.3.88 | |
NETGEAR R7960P firmware | ||
NETGEAR R8000 firmware | <1.0.4.84 | |
NETGEAR R8000 firmware | ||
NETGEAR R8000P | <1.4.3.88 | |
NETGEAR R8000P firmware | ||
NETGEAR R8500 | <1.0.2.158 | |
NETGEAR R8500 | ||
NETGEAR RAX15 firmware | <1.0.10.110 | |
NETGEAR RAX15 firmware | ||
NETGEAR RAX20 firmware | <1.0.10.110 | |
NETGEAR RAX20 firmware | ||
NETGEAR RAX200 firmware | <1.0.6.138 | |
NETGEAR RAX200 firmware | ||
NETGEAR RAX35 firmware | <1.0.10.110 | |
Netgear RAX35 | =v2 | |
NETGEAR RAX38v2 Firmware | <1.0.10.110 | |
NETGEAR RAX38v2 Firmware | =v2 | |
NETGEAR RAX40 firmware | <1.0.10.110 | |
NETGEAR RAX40 firmware | =v2 | |
NETGEAR RAX42 | <1.0.10.110 | |
NETGEAR RAX42 Firmware | ||
Netgear RAX43 | <1.0.10.110 | |
Netgear RAX43 | ||
NETGEAR RAX45 firmware | <1.0.10.110 | |
NETGEAR RAX45 firmware | ||
NETGEAR RAX48 | <1.0.10.110 | |
NETGEAR RAX48 Firmware | ||
NETGEAR RAX50 | <1.0.10.110 | |
NETGEAR RAX50 | ||
NETGEAR RAX50 | <1.0.10.110 | |
NETGEAR RAX50 | ||
NETGEAR RAX75 firmware | <1.0.6.138 | |
NETGEAR RAX75 firmware | ||
NETGEAR RAX80 firmware | <1.0.6.138 | |
NETGEAR RAX80 firmware | ||
NETGEAR RS400 firmware | <1.5.1.86 | |
NETGEAR RS400 firmware | ||
NETGEAR R7100LG firmware | <1.0.0.76 | |
Netgear R7100LG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27642 is classified as a critical vulnerability because it allows network-adjacent attackers to bypass authentication on affected NETGEAR routers.
To mitigate CVE-2022-27642, users should upgrade their NETGEAR R6700v3 firmware to the latest version that addresses this vulnerability.
CVE-2022-27642 primarily affects NETGEAR R6700v3 routers running firmware version 1.0.4.120_10.0.91 and older.
CVE-2022-27642 can be exploited by attackers who are on the same network segment as the affected routers.
No, authentication is not required to exploit CVE-2022-27642, making it a significant security risk.