NETGEAR RAX30 Cleartext Config Disclosure via Auth Bypass
CVE-2023-27370 Published on May 3, 2024
NETGEAR RAX30 Device Configuration Cleartext Storage Information Disclosure Vulnerability
NETGEAR RAX30 Device Configuration Cleartext Storage Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the handling of device configuration. The issue results from the storage of configuration secrets in plaintext. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-19841.
Weakness Type
Cleartext Storage of Sensitive Information
The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere. Because the information is stored in cleartext, attackers could potentially read it. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Products Associated with CVE-2023-27370
Want to know whenever a new CVE is published for Netgear Rax30 Firmware? stack.watch will email you.
Affected Versions
NETGEAR RAX30:- Version 1.0.9.90_3 is affected.
- Before 1.0.10.94 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.