First published: Fri May 03 2024(Updated: )
NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injection Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the clearAlertByIds function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-19724.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear ProSAFE Network Management Software 300 | <1.7.0.20 | |
Netgear ProSAFE Network Management Software 300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38100 has been classified as a privilege escalation vulnerability with significant impact on the affected systems.
To mitigate CVE-2023-38100, it is recommended to update the NETGEAR ProSAFE Network Management System to the latest version available.
Yes, CVE-2023-38100 can be exploited by remote attackers, but authentication is required to access the vulnerable components.
CVE-2023-38100 affects NETGEAR ProSAFE Network Management System versions up to 1.7.0.20.
CVE-2023-38100 allows attackers to escalate privileges, potentially granting unauthorized access to sensitive functionalities.