First published: Fri May 03 2024(Updated: )
NETGEAR RAX30 Device Configuration Cleartext Storage Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of device configuration. The issue results from the storage of configuration secrets in plaintext. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-19841.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 | ||
All of | ||
NETGEAR RAX30 firmware | <1.0.10.94 | |
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27370 is classified as a medium severity vulnerability due to the ability of authenticated attackers to access sensitive information.
To mitigate CVE-2023-27370, users should update their NETGEAR RAX30 firmware to the latest version that addresses this vulnerability.
CVE-2023-27370 affects installations of NETGEAR RAX30 routers running firmware versions up to 1.0.10.94.
CVE-2023-27370 is a cleartext storage information disclosure vulnerability that allows attackers to expose sensitive data.
Yes, authentication is required for an attacker to exploit CVE-2023-27370.