ID

VAR-202305-0252


CVE

CVE-2023-27370


TITLE

of netgear  RAX30  Vulnerability related to plaintext storage of important information in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2023-027714

DESCRIPTION

NETGEAR RAX30 Device Configuration Cleartext Storage Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of device configuration. The issue results from the storage of configuration secrets in plaintext. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-19841. NETGEAR RAX30 is a dual-band wireless router from NETGEAR

Trust: 2.79

sources: NVD: CVE-2023-27370 // JVNDB: JVNDB-2023-027714 // ZDI: ZDI-23-501 // CNVD: CNVD-2024-33909

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-33909

AFFECTED PRODUCTS

vendor:netgearmodel:rax30scope: - version: -

Trust: 1.3

vendor:netgearmodel:rax30scope:ltversion:1.0.10.94

Trust: 1.0

vendor:ネットギアmodel:rax30scope:eqversion: -

Trust: 0.8

vendor:ネットギアmodel:rax30scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax30scope:eqversion:rax30 firmware 1.0.10.94

Trust: 0.8

sources: ZDI: ZDI-23-501 // CNVD: CNVD-2024-33909 // JVNDB: JVNDB-2023-027714 // NVD: CVE-2023-27370

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2023-27370
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2023-27370
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-27370
value: MEDIUM

Trust: 0.8

ZDI: CVE-2023-27370
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2024-33909
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2024-33909
severity: MEDIUM
baseScore: 5.5
vectorString: AV:A/AC:L/AU:S/C:C/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 5.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2023-27370
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 3.6
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2023-27370
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 3.6
version: 3.1

Trust: 1.0

ZDI: CVE-2023-27370
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-23-501 // CNVD: CNVD-2024-33909 // JVNDB: JVNDB-2023-027714 // NVD: CVE-2023-27370 // NVD: CVE-2023-27370

PROBLEMTYPE DATA

problemtype:CWE-312

Trust: 1.0

problemtype:Plaintext storage of important information (CWE-312) [NVD evaluation ]

Trust: 0.8

problemtype: Plaintext storage of important information (CWE-312) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-027714 // NVD: CVE-2023-27370

PATCH

title:NETGEAR has issued an update to correct this vulnerability.url:https://kb.netgear.com/000065619/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0348

Trust: 0.7

title:Patch for NETGEAR RAX30 Information Disclosure Vulnerability (CNVD-2024-33909)url:https://www.cnvd.org.cn/patchInfo/show/574386

Trust: 0.6

sources: ZDI: ZDI-23-501 // CNVD: CNVD-2024-33909

EXTERNAL IDS

db:NVDid:CVE-2023-27370

Trust: 3.9

db:ZDIid:ZDI-23-501

Trust: 2.5

db:JVNDBid:JVNDB-2023-027714

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-19841

Trust: 0.7

db:CNVDid:CNVD-2024-33909

Trust: 0.6

sources: ZDI: ZDI-23-501 // CNVD: CNVD-2024-33909 // JVNDB: JVNDB-2023-027714 // NVD: CVE-2023-27370

REFERENCES

url:https://kb.netgear.com/000065619/security-advisory-for-multiple-vulnerabilities-on-the-rax30-psv-2022-0348

Trust: 2.5

url:https://www.zerodayinitiative.com/advisories/zdi-23-501/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-27370

Trust: 0.8

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2023-27370

Trust: 0.6

sources: ZDI: ZDI-23-501 // CNVD: CNVD-2024-33909 // JVNDB: JVNDB-2023-027714 // NVD: CVE-2023-27370

CREDITS

Claroty Research - Vera Mens, Noam Moshe, Uri Katz, Sharon Brizinov

Trust: 0.7

sources: ZDI: ZDI-23-501

SOURCES

db:ZDIid:ZDI-23-501
db:CNVDid:CNVD-2024-33909
db:JVNDBid:JVNDB-2023-027714
db:NVDid:CVE-2023-27370

LAST UPDATE DATE

2025-01-07T23:31:26.377000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-23-501date:2023-05-01T00:00:00
db:CNVDid:CNVD-2024-33909date:2024-07-30T00:00:00
db:JVNDBid:JVNDB-2023-027714date:2025-01-06T06:19:00
db:NVDid:CVE-2023-27370date:2025-01-03T17:01:01.870

SOURCES RELEASE DATE

db:ZDIid:ZDI-23-501date:2023-05-01T00:00:00
db:CNVDid:CNVD-2024-33909date:2024-07-26T00:00:00
db:JVNDBid:JVNDB-2023-027714date:2025-01-06T00:00:00
db:NVDid:CVE-2023-27370date:2024-05-03T02:15:15.763