First published: Fri May 03 2024(Updated: )
NETGEAR ProSAFE Network Management System createUser Missing Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the createUser function. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-19726.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear ProSAFE Network Management Software 300 | <1.7.0.20 | |
Netgear ProSAFE Network Management Software 300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38102 has been classified as a medium severity vulnerability due to its potential for privilege escalation.
To address CVE-2023-38102, ensure that you update to the latest version of the NETGEAR ProSAFE Network Management System where the vulnerability is patched.
CVE-2023-38102 affects installations of the NETGEAR ProSAFE Network Management System that have not been updated to the latest security patches.
CVE-2023-38102 is a missing authorization vulnerability that allows remote attackers to escalate their privileges.
Yes, authentication is required to exploit CVE-2023-38102, but it still poses a significant risk if unauthorized users gain access.