First published: Fri May 03 2024(Updated: )
NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the system configuration. The system contains a hardcoded user account which can be used to access the CLI service as a low-privileged user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19660.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 | ||
All of | ||
NETGEAR RAX30 firmware | <1.0.10.94 | |
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34284 is categorized as a high severity vulnerability due to its potential for undetected authentication bypass.
To fix CVE-2023-34284, users should update their NETGEAR RAX30 firmware to the latest version that addresses this vulnerability.
CVE-2023-34284 affects NETGEAR RAX30 routers running firmware versions prior to 1.0.10.94.
No, CVE-2023-34284 requires network-adjacent access for exploitation.
Exploiting CVE-2023-34284 could allow an attacker to bypass authentication and gain unauthorized access to the affected router.