Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.

Project Subscriptions

Vendors Products
Netgear Subscribe
Gc108p Firmware Subscribe
Gc108pp Subscribe
Gc108pp Firmware Subscribe
Gs108t Firmware Subscribe
Gs108tv3 Subscribe
Gs110tp Subscribe
Gs110tp Firmware Subscribe
Gs110tpp Subscribe
Gs110tpp Firmware Subscribe
Gs110tup Subscribe
Gs110tup Firmware Subscribe
Gs308t Firmware Subscribe
Gs310tp Subscribe
Gs310tp Firmware Subscribe
Gs710tup Subscribe
Gs710tup Firmware Subscribe
Gs716tp Subscribe
Gs716tp Firmware Subscribe
Gs716tpp Subscribe
Gs716tpp Firmware Subscribe
Gs724tp Subscribe
Gs724tp Firmware Subscribe
Gs724tpp Subscribe
Gs724tpp Firmware Subscribe
Gs728tp Subscribe
Gs728tp Firmware Subscribe
Gs728tpp Subscribe
Gs728tpp Firmware Subscribe
Gs750e Firmware Subscribe
Gs752tp Subscribe
Gs752tp Firmware Subscribe
Gs752tpp Subscribe
Gs752tpp Firmware Subscribe
Ms510txm Subscribe
Ms510txm Firmware Subscribe
Ms510txup Subscribe
Ms510txup Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-28022 Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T02:51:07.765Z

Reserved: 2021-09-13T00:00:00

Link: CVE-2021-40867

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-13T08:15:13.323

Modified: 2024-11-21T06:24:58.477

Link: CVE-2021-40867

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses