Latest Netgear vulnerabilities #
Netgear has disclosed vulnerabilities in certain models of its wireless access points and WiFi routers:
- PSV-2023-0039 is rated highly critical with a CVSS score of 9.8. Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the vulnerable device.
- PSV-2024-0117 is rated highly critical with a CVSS score of 9.6. Successful exploitation of this vulnerability would allow an attacker to bypass authentication and take control of the vulnerable device.
There is evidence that these vulnerabilities are being actively exploited in the wild. Note that some of the affected devices, notably the WAX206 and WAX220 wireless access points are end-of-life; the vendor has still released a security update for these devices due to the severity of the issue.
What is the impact? #
Successful exploitation of these vulnerabilities would allow an attacker to take control of the vulnerable devices. As these devices are generally located at the network edge, they are often exposed to the public internet.
Are updates or workarounds available? #
Netgear has released updated firmware for the affected devices. Users are urged to update as quickly as possible.
How do I find potentially vulnerable systems with runZero? #
From the Assets Inventory, use the following query to locate systems running potentially vulnerable systems:
hw:"XR1000" OR hw:"XR1000v2" OR hw:"XR500" OR hw:"WAX206" OR hw:"WAX220" OR hw:"WAX214v2" OR hw:"WAX2xx"