[TheRecord] ‘Demon’s Cries’ authentication bypass patched in Netgear switches

Networking equipment vendor Netgear has patched three vulnerabilities in several of its smart switches that can allow threat actors to bypass authentication and take over devices.

Codenamed Demon’s CriesDraconian Fear, and Seventh Inferno, the vulnerabilities were discovered and reported to Netgear by a Polish security researcher going by the pseudonym of Gynvael Coldwind.

Netgear released patches last week on September 3.The researcher published detailed write-ups for the first two bugs, Demon’s Cries and Draconian Fear.Coldwind said technical details about the Seventh Inferno bug would be published next Monday, on September 13.

Of the three vulnerabilities, the first, known as Demon’s Cries, is considered the most severe, with a severity rating of 9.8 out of a maximum of 10, on the CVSSv3 scale.

As Coldwind explained today, the vulnerability can be used to change to bypass initial authentication and change the admin account password for affected Netgear switches.

Not all switches are vulnerable, as the bug resides in the device’s web-based administration panel, known as SCC Control (NETGEAR Smart Control Center), which is disabled by default.

However, if the web UI is enabled, Coldwind says the bug can result in “a full compromise of the device.”

The Polish researcher said he initially tested the bug on a Netgear GS110TPV3 Smart Managed Pro Switch, but the US company confirmed that both Demon’s Cries and Draconian Fear impact a much larger list of devices.

Affected Netgear models:

GC108PGC108PPGS108Tv3GS110TPPGS110TPv3GS110TUPGS308TGS310TPGS710TUPGS716TPGS716TPPGS724TPPGS724TPv2GS728TPPv2GS728TPv2GS750EGS752TPPGS752TPv2MS510TXMMS510TXUP

On the other hand, the Draconian Fear vulnerability, while also an authentication bypass, is considered less severe. Coldwind said this bug could only be exploited to hijack logged-in admin sessions, but the attack needs to be carried out from the admin’s IP address.

The researcher released proof-of-concept code for both bugs.

The post ‘Demon’s Cries’ authentication bypass patched in Netgear switches appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[ESET] Gaming industry under siege from cyberattacks during pandemic

All posts, ESET feed

Cyberattacks targeting the gaming industry skyrocket, with web attacks more than tripling year-on-year in 2020 The post Gaming industry under siege from cyberattacks during pandemic appeared first on WeLiveSecurity Source: Read More (WeLiveSecurity)

Read More

Daily NCSC-FI news followup 2022-02-09

Finanssialan varautuminen hyvällä tolalla www.huoltovarmuuskeskus.fi/a/finanssialan-varautuminen-hyvalla-tolalla Suomalaiset pankit ja rahoitusalan viranomaiset suoriutuivat hyvin syksyn FATO-harjoituksesta. Harjoituksen tulosten perusteella finanssiala on parantanut varautumistaan erilaisiin uhkiin. Kehittämistä löytyi vielä esimerkiksi yhteistoiminnassa ja viestinnässä. Pankkitoimintaan kohdistuvia uhkia ovat esimerkiksi erilaiset kyberhyökkäykset tai taloudelliset kriisit. Pankit ovat muun muassa maksuliikenteen hoidon takia keskeisiä koko yhteiskunnan toiminnan kannalta, ja niiden varautumista […]

Read More

[ZDNet] 96% of third-party container applications deployed in cloud infrastructure contain known vulnerabilities: Unit 42

All posts, ZDNet

Unit 42 found that 63% of third-party code used in building cloud infrastructure contained insecure configurations. Source: Read More (Latest topics for ZDNet in Security)

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.