CVE-2020-37092
Netis · E1+ Range Extender
A security vulnerability has been identified in the Netis E1+ version 1 range extender. This flaw resides in the device's firmware and could allow for unauthorized access to the network device.
Executive summary
The Netis E1+ range extender (Version 1) contains a high-severity vulnerability that could allow an attacker to compromise the device and gain unauthorized access to the local network.
Vulnerability
This vulnerability affects the firmware of the Netis E1+ version 1. It likely involves a flaw in the web management interface or the device's handling of network requests, potentially allowing an unauthenticated attacker to gain administrative control over the range extender.
Business impact
A compromised range extender can serve as a persistent foothold for an attacker within a network, allowing for traffic interception and lateral movement. With a CVSS score of 7.5, this High severity vulnerability poses a significant risk to network privacy and the security of all devices connected through the extender.
Remediation
Immediate Action: Apply the latest firmware updates from Netis for the E1+ device. If the device has reached end-of-life (EOL), it should be replaced with a currently supported model.
Proactive Monitoring: Check for unauthorized changes to the device's configuration, such as modified DNS settings or unknown administrative accounts.
Compensating Controls: Disable remote management of the device from the WAN side and ensure the local management interface is protected by a strong, unique password.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The High CVSS score and the potential for network-wide impact make this a critical issue. Administrators must ensure that all Netis E1+ devices are updated or decommissioned if patches are unavailable to prevent them from being used as entry points for attackers.