NETGEAR SOAP Request Handling Remote Authentication Bypass

high Nessus Plugin ID 81791

Synopsis

The remote device is affected by an authentication bypass vulnerability.

Description

Nessus has determined that the remote NETGEAR device is running an embedded SOAP service which is used by the NETGEAR Genie application for viewing and setting various device features. Authentication to this service can be bypassed, and an attacker can exploit this vulnerability to interrogate and control the device by using crafted HTTP requests.

Solution

Allow only trusted devices access to the local network and disable access for remote / WAN management.

See Also

http://www.nessus.org/u?0d6c6d8a

Plugin Details

Severity: High

ID: 81791

File Name: netgear_soap_auth_bypass.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 3/12/2015

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 8.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: x-cpe:/a:netgear:netgear-soap-service

Required KB Items: installed_sw/Netgear WWW

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/12/2015

Reference Information

BID: 72640