CVE-2022-4390

A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned on ports 22 and 23 by default. This misconfiguration could allow an attacker to interact with services only intended to be accessible by clients on the local network.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:ax2400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ax2400:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://www.synacktiv.com/en/publications/cool-vulns-dont-live-long-netgear-and-pwn2own.html - Exploit, Patch, Third Party Advisory () https://www.synacktiv.com/en/publications/cool-vulns-dont-live-long-netgear-and-pwn2own.html - Exploit, Patch, Third Party Advisory
References () https://www.tenable.com/security/research/tra-2022-36%2C - () https://www.tenable.com/security/research/tra-2022-36%2C -

07 Nov 2023, 03:57

Type Values Removed Values Added
References
  • {'url': 'https://www.tenable.com/security/research/tra-2022-36,', 'name': 'https://www.tenable.com/security/research/tra-2022-36,', 'tags': ['Broken Link', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://www.tenable.com/security/research/tra-2022-36%2C -

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-668 NVD-CWE-Other

Information

Published : 2022-12-09 20:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4390

Mitre link : CVE-2022-4390

CVE.ORG link : CVE-2022-4390


JSON object : View

Products Affected

netgear

  • ax2400_firmware
  • ax2400