CVE-2020-37092

Netis · E1+ Range Extender

A security vulnerability has been identified in the Netis E1+ version 1 range extender. This flaw resides in the device's firmware and could allow for unauthorized access to the network device.

Executive summary

The Netis E1+ range extender (Version 1) contains a high-severity vulnerability that could allow an attacker to compromise the device and gain unauthorized access to the local network.

Vulnerability

This vulnerability affects the firmware of the Netis E1+ version 1. It likely involves a flaw in the web management interface or the device's handling of network requests, potentially allowing an unauthenticated attacker to gain administrative control over the range extender.

Business impact

A compromised range extender can serve as a persistent foothold for an attacker within a network, allowing for traffic interception and lateral movement. With a CVSS score of 7.5, this High severity vulnerability poses a significant risk to network privacy and the security of all devices connected through the extender.

Remediation

Immediate Action: Apply the latest firmware updates from Netis for the E1+ device. If the device has reached end-of-life (EOL), it should be replaced with a currently supported model.

Proactive Monitoring: Check for unauthorized changes to the device's configuration, such as modified DNS settings or unknown administrative accounts.

Compensating Controls: Disable remote management of the device from the WAN side and ensure the local management interface is protected by a strong, unique password.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The High CVSS score and the potential for network-wide impact make this a critical issue. Administrators must ensure that all Netis E1+ devices are updated or decommissioned if patches are unavailable to prevent them from being used as entry points for attackers.