First published: Fri May 03 2024(Updated: )
NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injection Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability. The specific flaw exists within the clearAlertByIds function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-21875.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear ProSAFE Network Management Software 300 | <1.7.0.31 | |
Netgear ProSAFE Network Management Software 300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44449 has a high severity rating due to its potential for privilege escalation in the NETGEAR ProSAFE Network Management System.
To remediate CVE-2023-44449, apply the latest security patches provided by NETGEAR for the ProSAFE Network Management System.
CVE-2023-44449 can facilitate SQL injection attacks that lead to privilege escalation for authenticated users.
Yes, authentication is required to exploit CVE-2023-44449, making it necessary for attackers to have valid user credentials.
CVE-2023-44449 affects NETGEAR ProSAFE Network Management System installations.