First published: Thu Jun 08 2023(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-19660 is considered critical due to the ability of network-adjacent attackers to bypass authentication.
To fix ZDI-CAN-19660, users should update their NETGEAR RAX30 routers to the latest firmware version provided by NETGEAR.
Only users of the NETGEAR RAX30 router are affected by the ZDI-CAN-19660 vulnerability.
No, ZDI-CAN-19660 requires an attacker to be on the same network as the affected device to exploit it.
An attacker can perform unauthorized actions on the NETGEAR RAX30 router due to authentication bypass caused by ZDI-CAN-19660.