First published: Fri May 03 2024(Updated: )
NETGEAR RAX30 GetInfo Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose sensitive information, leading to further compromise. Was ZDI-CAN-19608.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 | ||
All of | ||
NETGEAR RAX30 firmware | <1.0.10.94 | |
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-27357 is considered high due to the potential for unauthorized access to sensitive information.
To mitigate CVE-2023-27357, upgrade the NETGEAR RAX30 firmware to version 1.0.10.94 or later.
CVE-2023-27357 affects installations of NETGEAR RAX30 routers running vulnerable firmware versions.
CVE-2023-27357 is an information disclosure vulnerability that allows network-adjacent attackers to access sensitive data.
No, authentication is not required to exploit CVE-2023-27357, making it more dangerous for affected users.