Networking, storage and security solutions provider Netgear on Friday issued patches to address three security vulnerabilities affecting its smart switches that could be abused by an adversary to gain full control of a vulnerable device.

The flaws, which were discovered and reported to Netgear by Google security engineer Gynvael Coldwind, impact the following models -

  • GC108P (fixed in firmware version
  • GC108PP (fixed in firmware version
  • GS108Tv3 (fixed in firmware version
  • GS110TPP (fixed in firmware version
  • GS110TPv3 (fixed in firmware version
  • GS110TUP (fixed in firmware version
  • GS308T (fixed in firmware version
  • GS310TP (fixed in firmware version
  • GS710TUP (fixed in firmware version
  • GS716TP (fixed in firmware version
  • GS716TPP (fixed in firmware version
  • GS724TPP (fixed in firmware version
  • GS724TPv2 (fixed in firmware version
  • GS728TPPv2 (fixed in firmware version
  • GS728TPv2 (fixed in firmware version
  • GS750E (fixed in firmware version
  • GS752TPP (fixed in firmware version
  • GS752TPv2 (fixed in firmware version
  • MS510TXM (fixed in firmware version
  • MS510TXUP (fixed in firmware version

According to Coldwind, the flaws concern an authentication bypass, an authentication hijacking, and a third as-yet-undisclosed vulnerability that could grant an attacker the ability to change the administrator password without actually having to know the previous password or hijack the session bootstrapping information, resulting in a full compromise of the device.


The three vulnerabilities have been given the codenames Demon's Cries (CVSS score: 9.8), Draconian Fear (CVSS score: 7.8), and Seventh Inferno (TBD).

"A funny bug related to authorization spawns from the fact that the password is obfuscated by being XORed with 'NtgrSmartSwitchRock," Coldwind said in a write-up explaining the authentication bypass. "However, due to the fact that in the handler of TLV type 10 an strlen() is called on the still obfuscated password, it makes it impossible to authenticate correctly with a password that happens to have the same character as the phrase above at a given position."

Draconian Fear, on the other hand, requires the attacker to either have the same IP address as the admin or be able to spoof the address through other means. In such a scenario, the malicious party can take advantage of the fact that the Web UI relies only on the IP and a trivially guessable "userAgent" string to flood the authentication endpoint with multiple requests, thereby "greatly increasing the odds of getting the session information before admin's browser gets it."

In light of the critical nature of the vulnerabilities, companies relying on the aforementioned Netgear switches are recommended to upgrade to the latest version as soon as possible to mitigate any potential exploitation risk.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.