New information has surfaced concerning a newly patched serious vulnerability in NETGEAR smart switches that may allow attackers to execute malicious code and take control over affected devices.
The vulnerability, nicknamed “Seventh Inferno” (with a CVSS score of 9.8), is one of a trilogy of security flaws that Google security analyst Gynvael Coldwind disclosed to the networking, security, and storage solutions provider. The other two parts of this trio are Demon’s Cries (with a CVSS score of 9.8) and Draconian Fear (with a CVSS score of 7.8).
NETGEAR published fixes/patches to resolve the flaws on September 3rd.
An attacker who successfully exploited Suppose Demon’s Cries and Draconian Fear could change the administrator password without knowing the prior password or hijack the session bootstrapping information, and completely compromise the device.
In a recent update regarding Seventh Inferno, Coldwind explained that a newline injection vulnerability causes the problem in the password field during Web UI login. It allows an attacker to build fake session files and combine them with a reboot DoS and a post-authentication shell injection to obtain an utterly legitimate session and execute any code as the root user.
“This vulnerability and exploit chain is actually quite interesting technically,” Coldwind said. “In short, it goes from a newline injection in the password field, through being able to write a file with constant uncontrolled content of ‘2’ (like, one byte 32h), through a DoS and session crafting (which yields an admin web UI user), to an eventual post-auth shell injection (which yields full root).”
All models affected by three vulnerabilities are:
· GC108P (fixed in firmware version 1.0.8.2)
· GC108PP (fixed in firmware version 1.0.8.2)
· GS108Tv3 (fixed in firmware version 7.0.7.2)
· GS110TPP (fixed in firmware version 7.0.7.2)
· GS110TPv3 (fixed in firmware version 7.0.7.2)
· GS110TUP (fixed in firmware version 1.0.5.3)
· GS308T (fixed in firmware version 1.0.3.2)
· GS310TP (fixed in firmware version 1.0.3.2)
· GS710TUP (fixed in firmware version 1.0.5.3)
· GS716TP (fixed in firmware version 1.0.4.2)
· GS716TPP (fixed in firmware version 1.0.4.2)
· GS724TPP (fixed in firmware version 2.0.6.3)
· GS724TPv2 (fixed in firmware version 2.0.6.3)
· GS728TPPv2 (fixed in firmware version 6.0.8.2)
· GS728TPv2 (fixed in firmware version 6.0.8.2)
· GS750E (fixed in firmware version 1.0.1.10)
· GS752TPP (fixed in firmware version 6.0.8.2)
· GS752TPv2 (fixed in firmware version 6.0.8.2)
· MS510TXM (fixed in firmware version 1.0.4.2)
· MS510TXUP (fixed in firmware version 1.0.4.2)