Plataforma
netgear
Componente
netgear-prosafe-network-management-system
Corrigido em
1.7.1
CVE-2024-5505 is a Remote Code Execution (RCE) vulnerability affecting the NETGEAR ProSAFE Network Management System. This flaw allows authenticated attackers to execute arbitrary code on vulnerable systems, potentially leading to complete system compromise. The vulnerability impacts versions 1.7.0.34–1.7.0.34 x64. A fix is pending from NETGEAR.
The primary impact of CVE-2024-5505 is the ability for an authenticated attacker to execute arbitrary code on the affected NETGEAR ProSAFE Network Management System. This means an attacker could gain full control of the device, potentially accessing sensitive network configurations, user credentials, and other data. Successful exploitation could allow for lateral movement within the network, enabling the attacker to compromise other connected devices. The SYSTEM context under which the code executes grants a high level of privilege, maximizing the potential damage. This vulnerability shares similarities with other file upload vulnerabilities where insufficient path validation allows for traversal and code execution.
CVE-2024-5505 was reported to ZDI (ZDI-CAN-22724) and subsequently disclosed publicly on 2024-06-06. The vulnerability's CVSS score of 8.8 (HIGH) indicates a significant risk. Currently, there are no publicly available exploits, but the ease of exploitation (requiring only authentication) suggests a medium probability of exploitation. It is not currently listed on CISA KEV, but this could change. Monitor security advisories from NETGEAR and security news sources for updates.
Organizations using NETGEAR ProSAFE Network Management System in environments with limited network segmentation are particularly at risk. Those with legacy configurations or weak authentication practices are also more vulnerable. Shared hosting environments where multiple users share the same ProSAFE device should be considered high-priority targets.
• linux / server: Monitor system logs (journalctl) for unusual file upload activity or errors related to the UpLoadServlet. Look for attempts to access files outside of the intended upload directory.
journalctl -u prosafe -f | grep -i "uploadservlet"• generic web: Use curl or wget to test the upload endpoint with a path traversal payload (e.g., ../../../../etc/passwd). Examine the response headers and content for any signs of unauthorized file access.
curl -X POST -F "file=../../../../etc/passwd" http://<prosafe_ip>/uploadservlet• netgear: Review the ProSAFE Network Management System configuration for any unusual or unauthorized user accounts. Check for suspicious scheduled tasks or processes that might be related to exploitation.
disclosure
Status do Exploit
EPSS
76.00% (percentil 99%)
CISA SSVC
Vetor CVSS
While a direct patch is pending, several mitigation steps can reduce the risk. First, restrict network access to the NETGEAR ProSAFE Network Management System to only trusted sources. Implement strict firewall rules to limit inbound connections. Monitor file uploads closely, looking for suspicious filenames or extensions. Consider using a Web Application Firewall (WAF) to filter potentially malicious requests. If possible, temporarily disable the UpLoadServlet functionality. After a fix is released, upgrade to the patched version immediately and verify the fix by attempting a file upload with a known malicious path to ensure it is blocked.
Actualice el NETGEAR ProSAFE Network Management System a una versión que no sea vulnerable. Consulte el sitio web del proveedor para obtener la última versión y las instrucciones de actualización.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2024-5505 is a Remote Code Execution vulnerability in NETGEAR ProSAFE Network Management System versions 1.7.0.34–1.7.0.34 x64, allowing authenticated attackers to execute arbitrary code.
If you are running NETGEAR ProSAFE Network Management System version 1.7.0.34–1.7.0.34 x64, you are potentially affected by this vulnerability.
Upgrade to the patched version when available from NETGEAR. Until then, implement mitigation steps like restricting network access and monitoring file uploads.
While no public exploits are currently available, the vulnerability's ease of exploitation suggests a medium probability of exploitation. Monitor security advisories for updates.
Refer to the NETGEAR security advisory page for the latest information and updates regarding CVE-2024-5505.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.