Lucene search

K
attackerkbAttackerKBAKB:EA43ADE3-53E2-41E4-916F-F1E09471C28C
HistoryJul 28, 2020 - 12:00 a.m.

CVE-2020-10924

2020-07-2800:00:00
attackerkb.com
16

EPSS

0.004

Percentile

73.8%

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9643.

Recent assessments:

gwillcox-r7 at November 25, 2020 5:50pm UTC reported:

This was a stack overflow vulnerability within the UPNP daemon (/usr/sbin/upnpd) of NETGEAR R6700v3 routers running firmware versions V1.0.2.62 up to but not including V1.0.4.94 that was exploited by Pedro Ribeiro and Radek Domanski of Team Flashback in 2019’s Pwn2Own Tokyo competition. Note that whilst this vulnerability does require authentication to exploit, attackers can easily bypass this requirement via CVE-2020-10923, as was done in the Pwn2Own competition.

Successful exploitation grants the attacker the ability to change memory and settings on the target device, which was used in the Pwn2Own competition, and in the Metasploit module that was subsequently created, to reset the admin password back to its factory default of password, thereby allowing attackers to enable Telnet on the target device and gain a shell as the root user.

As a Metasploit module for this vulnerability exists which reliably results in RCE as root, it is strongly recommended to apply patches for this vulnerability. Do however keep in mind that as this vulnerability relies on UPNP, it is likely that an attacker would still need to be within your local network in order to exploit this vulnerability, though if they do exploit it they will gain full control over the router itself, which could end up allowing them to either gain an initial foothold into your network, or potentially hop between networks.

Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 3

EPSS

0.004

Percentile

73.8%

Related for AKB:EA43ADE3-53E2-41E4-916F-F1E09471C28C