Lucene search

K
vulnrichmentZdiVULNRICHMENT:CVE-2023-34284
HistoryMay 03, 2024 - 1:57 a.m.

CVE-2023-34284 NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vulnerability

2024-05-0301:57:11
CWE-798
zdi
github.com
5
netgear rax30
hard-coded credentials
authentication bypass
vulnerability
zdi-can-19660

CVSS3

6.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

16.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the system configuration. The system contains a hardcoded user account which can be used to access the CLI service as a low-privileged user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19660.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:netgear:rax30_firmware:*:*:*:*:*:*:*:*"
    ],
    "vendor": "netgear",
    "product": "rax30_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.0.10.94",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

16.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-34284