Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Netgear
Subscribe
|
Gc108p
Subscribe
Gc108p Firmware
Subscribe
Gc108pp
Subscribe
Gc108pp Firmware
Subscribe
Gs108t Firmware
Subscribe
Gs108tv3
Subscribe
Gs110tp
Subscribe
Gs110tp Firmware
Subscribe
Gs110tpp
Subscribe
Gs110tpp Firmware
Subscribe
Gs110tup
Subscribe
Gs110tup Firmware
Subscribe
Gs308t
Subscribe
Gs308t Firmware
Subscribe
Gs310tp
Subscribe
Gs310tp Firmware
Subscribe
Gs710tup
Subscribe
Gs710tup Firmware
Subscribe
Gs716tp
Subscribe
Gs716tp Firmware
Subscribe
Gs716tpp
Subscribe
Gs716tpp Firmware
Subscribe
Gs724tp
Subscribe
Gs724tp Firmware
Subscribe
Gs724tpp
Subscribe
Gs724tpp Firmware
Subscribe
Gs728tp
Subscribe
Gs728tp Firmware
Subscribe
Gs728tpp
Subscribe
Gs728tpp Firmware
Subscribe
Gs750e
Subscribe
Gs750e Firmware
Subscribe
Gs752tp
Subscribe
Gs752tp Firmware
Subscribe
Gs752tpp
Subscribe
Gs752tpp Firmware
Subscribe
Ms510txm
Subscribe
Ms510txm Firmware
Subscribe
Ms510txup
Subscribe
Ms510txup Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-28022 | Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T02:51:07.765Z
Reserved: 2021-09-13T00:00:00
Link: CVE-2021-40867
No data.
Status : Modified
Published: 2021-09-13T08:15:13.323
Modified: 2024-11-21T06:24:58.477
Link: CVE-2021-40867
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD