VDB-11715 · OSVDB 101653 · GCVE-100-11715

Netgear Router DG/DGN/DM/JNR/WPNT Port tcp/32764 backdoor

CVSS Meta Temp Score
CVSS is a standardized scoring system to determine possibilities of attacks. The Temp Score considers temporal factors like disclosure, exploit and countermeasures. The unique Meta Score calculates the average score of different sources to provide a normalized scoring system.
Current Exploit Price (≈)
Our analysts are monitoring exploit markets and are in contact with vulnerability brokers. The range indicates the observed or calculated exploit price to be seen on exploit markets. A good indicator to understand the monetary effort required for and the popularity of an attack.
CTI Interest Score
Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. A high score indicates an elevated risk to be targeted for this vulnerability.
9.6$0-$5k0.00

Summaryinfo

A vulnerability marked as critical has been reported in Netgear Router DG/DGN/DM/JNR/WPNT. Affected by this vulnerability is an unknown functionality of the component Port tcp/32764. Performing a manipulation results in backdoor. Furthermore, an exploit is available. This vulnerability is considered historic because of its background and reception. It is suggested to use restrictive firewalling.

Detailsinfo

A vulnerability was found in Netgear Router DG/DGN/DM/JNR/WPNT (Router Operating System). It has been classified as very critical. This affects an unknown code of the component Port tcp/32764. The manipulation with an unknown input leads to a backdoor vulnerability. CWE is classifying the issue as CWE-912. The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was published 12/31/2013 by Eloi Vanderbeken as backdoor_description.pdf as confirmed presentation (GitHub). It is possible to read the advisory at github.com. The vendor was not involved in the public release. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 03/24/2019). The attack technique deployed by this issue is T1588.001 according to MITRE ATT&CK. Due to its background and reception, this vulnerability has a historic impact.

A public exploit has been developed by Eloi Vanderbeken in Python and been published immediately after the advisory. The exploit is shared for download at github.com. It is declared as highly functional. We expect the 0-day to have been worth approximately $25k-$100k. The advisory illustrates:

Very simple binary protocol: Header (0xC bytes) followed by a payload

It is possible to mitigate the weakness by firewalling tcp/32764.

The vulnerability is also documented in the vulnerability database at OSVDB (101653†). Further details are available at news.ycombinator.com. Similar entry is available at VDB-11714. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Affected

  • Netgear DG834 5.01.09
  • Netgear DG834B 5.01.14
  • Netgear DG834G 3.01.32 (Rev. 2)/4.01.40 (Rev. 3)
  • Netgear DGN1000
  • Netgear DGN1000B
  • Netgear DGN2000 1.1.1/1.1.11.0/1.3.10.0/1.3.11.0/1.3.12.0
  • Netgear DGN3500
  • Netgear DM111Pv2 2.00.27
  • Netgear JNR3210
  • Netgear WPNT834

Productinfo

Type

Vendor

Name

Version

License

Website

CPE 2.3info

CPE 2.2info

Screenshot

CVSSv4info

VulDB Vector: 🔍
VulDB Reliability: 🔍

CVSSv3info

VulDB Meta Base Score: 9.8
VulDB Meta Temp Score: 9.6

VulDB Base Score: 9.8
VulDB Temp Score: 9.6
VulDB Vector: 🔍
VulDB Reliability: 🔍

CVSSv2info

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VectorComplexityAuthenticationConfidentialityIntegrityAvailability
UnlockUnlockUnlockUnlockUnlockUnlock
UnlockUnlockUnlockUnlockUnlockUnlock
UnlockUnlockUnlockUnlockUnlockUnlock

VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍

Exploitinginfo

Class: Backdoor
CWE: CWE-912
CAPEC: 🔍
ATT&CK: 🔍

Physical: No
Local: No
Remote: Yes

Availability: 🔍
Access: Public
Status: Highly functional
Author: Eloi Vanderbeken
Programming Language: 🔍
Download: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍

0-DayUnlockUnlockUnlockUnlock
TodayUnlockUnlockUnlockUnlock

Threat Intelligenceinfo

Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍

Countermeasuresinfo

Recommended: Firewall
Status: 🔍

0-Day Time: 🔍
Exploit Delay Time: 🔍

Firewalling: 🔍

Timelineinfo

12/31/2013 🔍
12/31/2013 +0 days 🔍
01/06/2014 +6 days 🔍
03/24/2019 +1903 days 🔍

Sourcesinfo

Vendor: netgear.com

Advisory: backdoor_description.pdf
Researcher: Eloi Vanderbeken
Status: Confirmed

GCVE (VulDB): GCVE-100-11715
OSVDB: 101653

scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍

Entryinfo

Created: 01/06/2014 16:00
Updated: 03/24/2019 10:55
Changes: 01/06/2014 16:00 (58), 03/24/2019 10:55 (2)
Complete: 🔍
Cache ID: 216:3A3:103

Discussion

No comments yet. Languages: en.

Please log in to comment.

Want to stay up to date on a daily basis?

Enable the mail alert feature now!