Description Preview
Overview
This vulnerability (CVE-2021-45673) is a stored cross-site scripting (CWE-79) issue affecting several NETGEAR router models. When exploited, it allows attackers to inject and store malicious scripts on the router that execute when administrators or users access the compromised web interface. This could lead to cookie theft, credential harvesting, session hijacking, or other client-side attacks. The vulnerability affects the web management interface of the routers and requires the attacker to have some form of access to the router's configuration interface to inject the malicious payload.
Remediation
NETGEAR has released firmware updates to address this vulnerability. Users should update their router firmware to the following versions or newer:
- R7000: Update to version 1.0.11.110 or later
- R7900: Update to version 1.0.4.30 or later
- R8000: Update to version 1.0.4.62 or later
- RAX200: Update to version 1.0.3.106 or later
- R7000P: Update to version 1.3.3.140 or later
- RAX80: Update to version 1.0.3.106 or later
- R6900P: Update to version 1.3.3.140 or later
- RAX75: Update to version 1.0.3.106 or later
To update the firmware:
- Access your router's web interface by typing its IP address in a browser
- Log in with your administrator credentials
- Navigate to the Administration or Advanced section
- Look for Firmware Update or Router Update option
- Download the appropriate firmware from NETGEAR's support site and follow the update instructions
Additionally, as a general security practice, ensure that remote administration is disabled and strong, unique passwords are used for router access.
References
- NETGEAR Security Advisory for Stored Cross-Site Scripting: https://kb.netgear.com/000064456/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2020-0003
- MITRE CWE-79 (Cross-site Scripting): https://cwe.mitre.org/data/definitions/79.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade