Lucene search

K
talosTalos IntelligenceTALOS-2022-1598
HistoryMar 21, 2023 - 12:00 a.m.

Netgear Orbi Router RBR750 Remote Management cleartext transmission vulnerability

2023-03-2100:00:00
Talos Intelligence
www.talosintelligence.com
14
remote management
netgear
rbr750
vulnerability
cleartext
transmission
man-in-the-middle
disclosure
sensitive information
cve-2022-38458
cvssv3
cwe-311
wi-fi system
web services management
https
authentication
patch
public release
cisco talos

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

48.9%

Talos Vulnerability Report

TALOS-2022-1598

Netgear Orbi Router RBR750 Remote Management cleartext transmission vulnerability

March 21, 2023
CVE Number

CVE-2022-38458

SUMMARY

A cleartext transmission vulnerability exists in the Remote Management functionality of Netgear Orbi Router RBR750 4.6.8.5. A specially-crafted man-in-the-middle attack can lead to a disclosure of sensitive information.

CONFIRMED VULNERABLE VERSIONS

The versions below were either tested or verified to be vulnerable by Talos or confirmed to be vulnerable by the vendor.

Netgear Orbi Router RBR750 4.6.8.5

PRODUCT URLS

Orbi Router RBR750 - <https://www.netgear.com/support/product/RBR750&gt;

CVSSv3 SCORE

6.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

CWE

CWE-311 - Missing Encryption of Sensitive Data

DETAILS

The Orbi Mesh Wi-Fi System creates dedicated high-speed Wi-Fi connections to your Internet service. The Orbi router (model RBR750) connects to your modem or gateway. The Orbi satellite (model RBS750) extends the Wi-Fi signal throughout your home.

An option exists in the Web Services Management tool to β€œAlways use HTTPS to access the router”. However, if a user browses to http://&lt;router_ip&gt;/ they are prompted for credentials before redirecting to HTTPS. In addition, the credentials must be valid in order for the redirect to proceed. Once redirected to HTTPS, the user is then prompted again for authentication, but this time over HTTPS.

TIMELINE

2022-08-30 - Initial Vendor Contact
2022-09-05 - Vendor Disclosure
2023-01-19 - Vendor Patch Release
2023-03-21 - Public Release

Credit

Discovered by Dave McDaniel of Cisco Talos.


Vulnerability Reports Next Report

TALOS-2022-1597

Previous Report

TALOS-2022-1595

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

48.9%

Related for TALOS-2022-1598