Plattform
netgear
Komponente
netgear-prosafe-network-management-system
Behoben in
1.7.1
CVE-2024-5505 is a Remote Code Execution (RCE) vulnerability affecting the NETGEAR ProSAFE Network Management System. This flaw allows authenticated attackers to execute arbitrary code on vulnerable systems, potentially leading to complete system compromise. The vulnerability impacts versions 1.7.0.34–1.7.0.34 x64. A fix is pending from NETGEAR.
The impact of CVE-2024-5505 is significant due to its RCE nature. A successful exploit allows an attacker to gain complete control over the affected NETGEAR ProSAFE Network Management System. This could lead to data breaches, system compromise, and potential lateral movement within the network. The attacker, requiring authentication, could install malware, steal sensitive configuration data, or disrupt network services. The ability to execute code as SYSTEM elevates the risk considerably, potentially allowing the attacker to compromise other systems accessible from the management system.
CVE-2024-5505 was disclosed publicly on June 6, 2024. The vulnerability was reported to NETGEAR as ZDI-CAN-22724. Currently, there are no publicly available exploits, but the ease of exploitation (requiring only authentication) suggests a medium probability of exploitation. Monitor security advisories and threat intelligence feeds for any signs of active exploitation campaigns.
Organizations using NETGEAR ProSAFE Network Management System in environments with limited network segmentation are particularly at risk. Those with legacy configurations or weak authentication practices are also more vulnerable. Shared hosting environments where multiple users share the same ProSAFE device should be considered high-priority targets.
• linux / server: Monitor system logs (journalctl) for unusual file upload activity or errors related to the UpLoadServlet. Look for attempts to access files outside of the intended upload directory.
journalctl -u prosafe -f | grep -i "uploadservlet"• generic web: Use curl or wget to test the upload endpoint with a path traversal payload (e.g., ../../../../etc/passwd). Examine the response headers and content for any signs of unauthorized file access.
curl -X POST -F "file=../../../../etc/passwd" http://<prosafe_ip>/uploadservlet• netgear: Review the ProSAFE Network Management System configuration for any unusual or unauthorized user accounts. Check for suspicious scheduled tasks or processes that might be related to exploitation.
disclosure
Exploit-Status
EPSS
76.00% (99% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-5505 is to upgrade to a patched version of the NETGEAR ProSAFE Network Management System as soon as it becomes available. Until the upgrade can be performed, consider implementing stricter authentication controls and limiting access to the UpLoadServlet functionality. Web Application Firewalls (WAFs) configured to detect and block directory traversal attempts can provide an additional layer of defense. Monitor system logs for suspicious activity related to file uploads and unusual process executions. After upgrade, confirm the vulnerability is resolved by attempting a controlled directory traversal request and verifying it is blocked.
Actualice el NETGEAR ProSAFE Network Management System a una versión que no sea vulnerable. Consulte el sitio web del proveedor para obtener la última versión y las instrucciones de actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-5505 is a Remote Code Execution vulnerability in NETGEAR ProSAFE Network Management System versions 1.7.0.34–1.7.0.34 x64, allowing authenticated attackers to execute arbitrary code.
If you are running NETGEAR ProSAFE Network Management System version 1.7.0.34–1.7.0.34 x64, you are potentially affected by this vulnerability.
Upgrade to the patched version when available from NETGEAR. Until then, implement mitigation steps like restricting network access and monitoring file uploads.
While no public exploits are currently available, the vulnerability's ease of exploitation suggests a medium probability of exploitation. Monitor security advisories for updates.
Refer to the NETGEAR security advisory page for the latest information and updates regarding CVE-2024-5505.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.