• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

PoC exploits released for Netgear Orbi router vulnerabilities

Bill Toulas by Bill Toulas
March 22, 2023
Reading Time: 3 mins read
0
PoC exploits released for Netgear Orbi router vulnerabilities

Orbi

RELATED POSTS

Clop ransomware claims responsibility for MOVEit extortion attacks

Microsoft’s Outlook.com is down again on mobile, web

New tool scans iPhones for ‘Triangulation’ malware infection

Proof-of-concept exploits for vulnerabilities in Netgear’s Orbi 750 series router and extender satellites have been released, with one flaw a critical severity remote command execution bug.

Netgear Orbi is a popular network mesh system for home users, providing strong coverage and high throughput on up to 40 simultaneously connected devices across spaces between 5,000 and 12,500 square feet.

The flaws in Netgear’s system were discovered by the Cisco Talos team and reported to the vendor on August 30, 2022. Cisco urges users to update their firmware to the latest version, 4.6.14.3, released on January 19, 2023.

The Orbi vulnerabilities

The first and most critical (CVSS v3.1: 9.1) flaw is tracked as CVE-2022-37337 and is a remotely exploitable command execution vulnerability in the access control functionality of the Netgear Orbi router.

An attacker can exploit publicly accessible admin consoles by sending a specially-crafted HTTP request to the vulnerable router to execute arbitrary commands on the device.

The Talos team has also published the following proof of concept (PoC) exploit for the flaw:

Buy JNews
ADVERTISEMENT
PoC for CVE-2022-37337
PoC exploit for CVE-2022-37337 (Cisco)

The second problem discovered by Cisco’s analysts is CVE-2022-38452, a high-severity remote command execution vulnerability in the router’s telnet service. The flaw’s exploitation requires valid credentials and a MAC address.

This is the only one of the four flaws that Netgear’s January firmware update did not address, so it remains unfixed. However, Cisco has disclosed a PoC exploit for it too.

PoC exploit for CVE-2022-38452
PoC exploit for CVE-2022-38452 (Cisco)

The third vulnerability is CVE-2022-36429, a high-severity command injection in the backend communications functionality of the Netgear Orbi Satellite, which links to the router to extend the network coverage.

An attacker can exploit this flaw by sending a sequence of specially-crafted JSON objects to the device. However, retrieving an admin token is required for the attack to work.

Finally, Cisco’s analysts discovered CVE-2022-38458, a cleartext transmission problem impacting the Remote Management functionality of the Netgear Orbi router, enabling man-in-the-middle attacks that can lead to sensitive information disclosure.

At the time of the disclosure, Cisco wasn’t aware of any cases of active exploitation of the above flaws. However, considering the availability of a PoC for CVE-2022-37337, threat actors could attempt to find misconfigured, publicly accessible routers to exploit.

The good news is that these exploits require local access, valid login credentials, or the admin console to be publicly accessible, making it much harder to exploit the vulnerabilities.

However, a quick search using Shodan found almost 10,000 Orbi devices publicly accessible from the Internet, with the majority located in the United States. If any use the default admin credentials, they could potentially be vulnerable to attackers.

While Orbi does support the automatic installation of updates, on an Orbi seen by BleepingComputer, new firmware did not automatically install, and it was running software released in August 2022.

Therefore, owners of Netgear Orbi 750 devices should manually check to see if they are running the latest version, and if not, upgrade their firmware as soon as possible.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Hackers exploit Control Web Panel flaw to open reverse shells
Cyber Security

Clop ransomware claims responsibility for MOVEit extortion attacks

June 5, 2023
Outlook for Mac now free, Microsoft 365 subscription not needed
Cyber Security

Microsoft’s Outlook.com is down again on mobile, web

June 5, 2023
New tool scans iPhones for ‘Triangulation’ malware infection
Cyber Security

New tool scans iPhones for ‘Triangulation’ malware infection

June 5, 2023
New AhRat Android malware hidden in app with 50,000 installs
Cyber Security

SpinOk Android malware found in more apps with 30 million installs

June 5, 2023
GIGABYTE releases new firmware to fix recently disclosed security flaws
Cyber Security

GIGABYTE releases new firmware to fix recently disclosed security flaws

June 5, 2023
Researchers secretly helped decrypt Zeppelin ransomware for 2 years
Cyber Security

KeePass v2.54 fixes bug that leaked cleartext master password

June 5, 2023

Recommended Stories

PHA investors can still be in doubt despite a surge in transaction volume

PHA investors can still be in doubt despite a surge in transaction volume

April 22, 2023
Will XRP make a comeback after the recent price decline? Data suggests…

Will XRP make a comeback after the recent price decline? Data suggests…

March 10, 2023
LFi unveils LFi smartphone, providing unprecedented access to DeFi opportunities

LFi unveils LFi smartphone, providing unprecedented access to DeFi opportunities

March 24, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Polygon zkEVM’s growth unhindered: What it means for MATIC
  • Polkadot announces new proposal; will DOT see a change of fate
  • PEPE’s hopes of a corrective bounce remain elusive

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?