CVE-2021-40867

Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tpp:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tup:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netgear:gs308t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs308t:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netgear:gs310tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs310tp:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs710tup:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs724tpp:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:netgear:gs750e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs750e:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs752tpp:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:24

Type Values Removed Values Added
References () https://gynvael.coldwind.pl/?id=741 - Exploit, Third Party Advisory () https://gynvael.coldwind.pl/?id=741 - Exploit, Third Party Advisory
References () https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145 - Vendor Advisory () https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145 - Vendor Advisory
CVSS v2 : 5.4
v3 : 7.1
v2 : 5.4
v3 : 7.8

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-362
CWE-287
CWE-290

Information

Published : 2021-09-13 08:15

Updated : 2024-11-21 06:24


NVD link : CVE-2021-40867

Mitre link : CVE-2021-40867

CVE.ORG link : CVE-2021-40867


JSON object : View

Products Affected

netgear

  • gc108pp
  • gs310tp_firmware
  • gc108p
  • gs728tpp_firmware
  • gs728tp_firmware
  • gs752tp
  • gs728tp
  • gs716tpp_firmware
  • ms510txm_firmware
  • gs308t
  • gs308t_firmware
  • gs716tp
  • ms510txup
  • gs110tp
  • gs710tup
  • gs108t_firmware
  • ms510txm
  • gs108tv3
  • gs752tp_firmware
  • gs110tp_firmware
  • gs724tp
  • gs110tup_firmware
  • ms510txup_firmware
  • gc108p_firmware
  • gs724tpp
  • gs752tpp_firmware
  • gs752tpp
  • gs750e
  • gs110tpp_firmware
  • gs710tup_firmware
  • gs728tpp
  • gs110tpp
  • gs310tp
  • gc108pp_firmware
  • gs110tup
  • gs724tp_firmware
  • gs750e_firmware
  • gs716tpp
  • gs724tpp_firmware
  • gs716tp_firmware
CWE
CWE-290

Authentication Bypass by Spoofing