Menu
Serious flaws found in Netgear's NMS300 network management system

Serious flaws found in Netgear's NMS300 network management system

The flaws could lead to remote code execution with system privileges and arbitrary file download

Serious vulnerabilities in the Netgear NMS300 ProSafe network management system, an application used to discover, monitor and configure a wide range of network devices, can allow hackers to take control of the servers it's running on.

The NMS300 can be installed on Windows XP, 7, 8, 10, as well as Windows Server 2003, 2008 and 2012. It allows network administrators to centrally manage network switches, routers, wireless access points, printers, network-attached storage systems, firewall appliances and other devices that support SNMP (Simple Network Management Protocol).

The software is free for managing up to 200 devices and provides an easy-to-use Web graphical interface that can be accessed remotely.

Pedro Ribeiro, a researcher with U.K.-based security consultancy Agile Information Security, found that the Web interface of the Netgear NMS300 allows unauthenticated users to upload and then execute arbitrary Java files. Since the NMS300 software runs under the system account on the underlying OS, the rogue Java code would be executed with system privileges.

Ribeiro also found a second vulnerability that would allow an attacker to force the NMS300 application to load any file from the underlying server and then make it available for download in a predictable location. This means an attacker could read any sensitive file from the server.

Ribeiro reported these issues to Netgear through the CERT Coordination Center at Carnegie Mellon University, which published an advisory about them on Wednesday. The latest NMS300 software, version 1.5.0.11, is affected and there are currently no patches available from Netgear.

CERT/CC recommends that administrators implement firewall rules to restrict access to the application's Web interface. Exposing the NMS300 to the Internet or to untrusted local networks should be avoided, Ribeiro said in an email sent to the Full Disclosure mailing list.

The implications of these vulnerabilities can be very serious because, according to its official specifications, the NMS300 system can modify the configurations of the managed devices and even automatically install firmware updates on them. This means that attackers who compromise the NMS300 application could also potentially compromise some of the devices that it manages or to open up additional holes in the network by modifying their configurations.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.‚Äč

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments