ID

VAR-202203-1667


CVE

CVE-2022-27643


TITLE

Classic buffer overflow vulnerability in multiple Netgear products

Trust: 0.8

sources: JVNDB: JVNDB-2022-021794

DESCRIPTION

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692. R6400 firmware, R6700 firmware, R6900P A classic buffer overflow vulnerability exists in multiple Netgear products, including firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 2.34

sources: NVD: CVE-2022-27643 // JVNDB: JVNDB-2022-021794 // ZDI: ZDI-22-519 // VULMON: CVE-2022-27643

AFFECTED PRODUCTS

vendor:netgearmodel:wndr3400scope:ltversion:1.0.1.44

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.0.4.126

Trust: 1.0

vendor:netgearmodel:wnr3500lscope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.4.126

Trust: 1.0

vendor:netgearmodel:ex6130scope:ltversion:1.0.0.48

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.78

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.3.88

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.3.88

Trust: 1.0

vendor:netgearmodel:d7000v2scope:ltversion:1.0.0.80

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.6.138

Trust: 1.0

vendor:netgearmodel:dc112ascope:ltversion:1.0.0.64

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.80

Trust: 1.0

vendor:netgearmodel:ex3700scope:ltversion:1.0.0.96

Trust: 1.0

vendor:netgearmodel:r7850scope:ltversion:1.0.5.84

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.1.86

Trust: 1.0

vendor:netgearmodel:r8500scope:ltversion:1.0.2.158

Trust: 1.0

vendor:netgearmodel:ex6120scope:ltversion:1.0.0.68

Trust: 1.0

vendor:netgearmodel:ex3800scope:ltversion:1.0.0.96

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.3.148

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.134

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.3.88

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.114

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.3.148

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.84

Trust: 1.0

vendor:netgearmodel:xr300scope:ltversion:1.0.3.72

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.6.138

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.6.138

Trust: 1.0

vendor:ネットギアmodel:xr300scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7960pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7100lgscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6700scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:wndr3400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rs400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6900pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:wnr3500lscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax75scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7900pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax200scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8000pscope: - version: -

Trust: 0.8

vendor:netgearmodel:r6700v3scope: - version: -

Trust: 0.7

sources: ZDI: ZDI-22-519 // JVNDB: JVNDB-2022-021794 // NVD: CVE-2022-27643

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2022-27643
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2022-27643
value: HIGH

Trust: 1.0

NVD: CVE-2022-27643
value: HIGH

Trust: 0.8

ZDI: CVE-2022-27643
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202203-2053
value: HIGH

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2022-27643
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2022-27643
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2022-27643
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-519 // JVNDB: JVNDB-2022-021794 // CNNVD: CNNVD-202203-2053 // NVD: CVE-2022-27643 // NVD: CVE-2022-27643

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-021794 // NVD: CVE-2022-27643

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202203-2053

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202203-2053

PATCH

title:NETGEAR has issued an update to correct this vulnerability.url:https://kb.netgear.com/000064720/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Multiple-Products-PSV-2021-0323

Trust: 0.7

title:NETGEAR R6700v3 Remediation measures for authorization problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=231212

Trust: 0.6

title: - url:https://github.com/H4lo/awesomt-IoT-security-article

Trust: 0.1

title: - url:https://github.com/H4lo/awesome-IoT-security-article

Trust: 0.1

sources: ZDI: ZDI-22-519 // VULMON: CVE-2022-27643 // CNNVD: CNNVD-202203-2053

EXTERNAL IDS

db:NVDid:CVE-2022-27643

Trust: 4.0

db:ZDIid:ZDI-22-519

Trust: 3.2

db:JVNDBid:JVNDB-2022-021794

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-15692

Trust: 0.7

db:CS-HELPid:SB2022032410

Trust: 0.6

db:CNNVDid:CNNVD-202203-2053

Trust: 0.6

db:VULMONid:CVE-2022-27643

Trust: 0.1

sources: ZDI: ZDI-22-519 // VULMON: CVE-2022-27643 // JVNDB: JVNDB-2022-021794 // CNNVD: CNNVD-202203-2053 // NVD: CVE-2022-27643

REFERENCES

url:https://kb.netgear.com/000064720/security-advisory-for-pre-authentication-buffer-overflow-on-multiple-products-psv-2021-0323

Trust: 3.1

url:https://www.zerodayinitiative.com/advisories/zdi-22-519/

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-27643

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-27643/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032410

Trust: 0.6

url:https://github.com/h4lo/awesomt-iot-security-article

Trust: 0.1

sources: ZDI: ZDI-22-519 // VULMON: CVE-2022-27643 // JVNDB: JVNDB-2022-021794 // CNNVD: CNNVD-202203-2053 // NVD: CVE-2022-27643

CREDITS

Stephen Fewer of Relyze Software Limited (www.relyze.com)

Trust: 1.3

sources: ZDI: ZDI-22-519 // CNNVD: CNNVD-202203-2053

SOURCES

db:ZDIid:ZDI-22-519
db:VULMONid:CVE-2022-27643
db:JVNDBid:JVNDB-2022-021794
db:CNNVDid:CNNVD-202203-2053
db:NVDid:CVE-2022-27643

LAST UPDATE DATE

2024-08-14T13:42:55.918000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-519date:2022-03-23T00:00:00
db:JVNDBid:JVNDB-2022-021794date:2023-11-14T04:15:00
db:CNNVDid:CNNVD-202203-2053date:2023-04-06T00:00:00
db:NVDid:CVE-2022-27643date:2023-04-05T15:06:04.507

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-519date:2022-03-23T00:00:00
db:JVNDBid:JVNDB-2022-021794date:2023-11-14T00:00:00
db:CNNVDid:CNNVD-202203-2053date:2022-03-23T00:00:00
db:NVDid:CVE-2022-27643date:2023-03-29T19:15:08.497