Vulnerability Description
An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely compromise the device from a malicious webpage. The attacker sends an FW_remote.htm&todo=cfg_init request without a cookie, reads the Set-Cookie header in the 401 Unauthorized response, and then repeats the FW_remote.htm&todo=cfg_init request with the specified cookie.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Wnr1000 Firmware | 1.1.0.54 |
| Netgear | Wnr1000 | 4 |
Related Weaknesses (CWE)
References
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-Third Party Advisory
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-Third Party Advisory
FAQ
What is CVE-2019-20489?
CVE-2019-20489 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely co...
How severe is CVE-2019-20489?
CVE-2019-20489 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-20489?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Wnr1000 Firmware, Netgear Wnr1000.