First published: Tue Mar 14 2023(Updated: )
Netgear RAX30 (AX2400), prior to version 1.0.6.74, was affected by an authentication bypass vulnerability, allowing an unauthenticated attacker to gain administrative access to the device's web management interface by resetting the admin password.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rax30 Firmware | <1.0.6.74 | |
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1327 is an authentication bypass vulnerability affecting Netgear RAX30 (AX2400) prior to version 1.0.6.74.
CVE-2023-1327 has a severity rating of 9.8 (Critical).
CVE-2023-1327 allows an unauthenticated attacker to gain administrative access to the device's web management interface by resetting the admin password.
Netgear RAX30 (AX2400) firmware versions up to and excluding 1.0.6.74 are affected by CVE-2023-1327.
No, Netgear RAX30 (AX2400) itself is not vulnerable to CVE-2023-1327.
You can find more information about CVE-2023-1327 at the following references: [Tenable Advisory](https://drupal9.tenable.com/security/research/tra-2023-10), [GitHub Advisory](https://github.com/advisories/GHSA-pvxx-rv48-qw5m)
The CWE for CVE-2023-1327 is CWE-287 (Improper Authentication).