NETGEAR RAX30 Hardcoded Credentials: Auth Bypass
CVE-2023-34284 Published on May 3, 2024

NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vulnerability
NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the system configuration. The system contains a hardcoded user account which can be used to access the CLI service as a low-privileged user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19660.

Vendor Advisory NVD

Weakness Type

Use of Hard-coded Credentials

The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.


Products Associated with CVE-2023-34284

Want to know whenever a new CVE is published for Netgear Rax30 Firmware? stack.watch will email you.

 

Affected Versions

NETGEAR RAX30: netgear rax30_firmware:

Exploit Probability

EPSS
0.03%
Percentile
8.55%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.