Netgear Prosafe Switch 5.4.1.13 /filesystem/ Script denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.0 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Netgear Prosafe Switch 5.4.1.13. It has been rated as problematic. Affected is an unknown function of the file filesystem/ of the component /filesystem/ Script. The manipulation leads to denial of service. This vulnerability is documented as CVE-2013-4776. Additionally, an exploit exists.
Details
A vulnerability was found in Netgear Prosafe Switch 5.4.1.13 and classified as problematic. This issue affects an unknown function of the file filesystem/ of the component /filesystem/ Script. The manipulation with an unknown input leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. Impacted is availability. The summary by CVE is:
NETGEAR ProSafe GS724Tv3 and GS716Tv2 with firmware 5.4.1.13 and earlier, GS748Tv4 5.4.1.14, and GS510TP 5.0.4.4 allows remote attackers to cause a denial of service (reboot or crash) via a crafted HTTP request to filesystem/.
The weakness was released 08/21/2013 by Juan J. Güelfo with Encripto AS as confirmed mailinglist post (Bugtraq). It is possible to read the advisory at seclists.org. The vendor was not involved in the public release. The identification of this vulnerability is CVE-2013-4776 since 07/08/2013. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details as well as a public exploit are known.
A public exploit has been developed by Juan J. Guelfo and been published immediately after the advisory. The exploit is available at encripto.no. It is declared as proof-of-concept.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at Exploit-DB (27775) and OSVDB (96477†). Entry connected to this vulnerability is available at VDB-10030. Be aware that VulDB is the high quality source for vulnerability data.
Affected
- GS724Tv3 5.4.1.1375.4.1.10
- GS716Tv2 5.4.1.13/5.4.1.10
- GS748Tv4 5.4.1.14
- GS510TP 5.0.4.4
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.netgear.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.0
VulDB Base Score: 5.3
VulDB Temp Score: 5.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Juan J. Guelfo
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 100943
OpenVAS Name: Multiple NetGear ProSafe Switches Information Disclosure Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Timeline
07/08/2013 🔍08/21/2013 🔍
08/21/2013 🔍
08/22/2013 🔍
08/23/2013 🔍
12/18/2013 🔍
06/30/2024 🔍
Sources
Vendor: netgear.comAdvisory: seclists.org
Researcher: Juan J. Güelfo
Organization: Encripto AS
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2013-4776 (🔍)
GCVE (CVE): GCVE-0-2013-4776
GCVE (VulDB): GCVE-100-10031
OSVDB: 96477
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 08/23/2013 13:22Updated: 06/30/2024 10:46
Changes: 08/23/2013 13:22 (64), 03/21/2019 14:00 (4), 06/30/2024 10:46 (16)
Complete: 🔍
Committer:
Cache ID: 216::103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.