Cybersecurity specialists report the detection of multiple vulnerabilities in NETGEAR network products. According to the report, successful exploitation of the vulnerabilities would allow threat actors to deploy multiple hacking variants.

Below are brief descriptions of the reported vulnerabilities, in addition to their respective identification keys and scores assigned according to the Common Vulnerability Scoring System (CVSS).

CVE-2022-27642: Excessive data output by the application would allow remote attackers with access to the local network or WiFi to unauthorized access to sensitive information stored in the system.

The flaw received a CVSS score of 5.7/10.

CVE-2022-27647: Excessive data production by the application would allow remote threat actors with local network or WiFi access to gain unauthorized access to sensitive information stored on the affected system.

The flaw received a CVSS score of 5.7/10.

CVE-2022-27643: An error processing authentication requests would allow hackers with physical access to the device to evade the authentication process and gain unauthorized access to the application.

This vulnerability received a CVSS score of 5/10.

CVE-2022-27645: Excessive data output by the application would allow remote attackers with access to the local network or WiFi to gain unauthorized access to sensitive information in the system.

This is a low severity flaw and received a CVSS score of 5.7/10.

CVE-2022-27646: A bug while processing authentication requests would allow threat actors with physical access to the device to evade the authentication process and gain unauthorized access to the affected system.

The flaw received a CVSS score of 5/10.

CVE-2022-27644: An error while processing authentication requests would allow attackers with physical access to the device to evade the authentication process and gain unauthorized access to the application.

This is a low severity flaw and received a CVSS score of 5/10.

No CVE key: An error while processing authentication requests would allow threat actors with physical access to the device to evade the authentication process and gain unauthorized access to the application.

The flaw received a CVSS score of 4.6/10.

According to the report, these flaws reside in the following NETGEAR products and versions:

  • CAX80: predates 2.1.3.7
  • LAX20: prior to 1.1.6.34
  • R7100LG: prior to 1.0.0.76
  • MR80: prior to 1.1.6.14
  • MS80: prior to 1.1.6.14
  • R6400: prior to 1.0.1.78
  • R6400v2: pre-1.0.4.126
  • R6700v3: predates 1.0.4.126
  • R6900P: pre-1.3.3.148
  • R7000: prior to 1.0.11.134
  • R7000P: pre-1.3.3.148
  • R8500: prior to 1.0.2.158
  • RAX15: prior to 1.0.10.110
  • RAX20: prior to 1.0.10.110
  • RAX35v2: pre-1.0.10.110
  • RAX38v2: pre-1.0.10.110
  • RAX40v2: pre-1.0.10.110
  • RAX42: prior to 1.0.10.110
  • RAX43: prior to 1.0.10.110
  • RAX45: prior to 1.0.10.110
  • RAX48: prior to 1.0.10.110
  • RAX50: prior to 1.0.10.110
  • RAX50S: pre-1.0.10.110
  • RS400: prior to 1.5.1.86

So far, no active exploitation attempts have been detected, although NETGEAR recommends that users of affected deployments update as soon as possible.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.