CVE-2022-40619

NETGEAR · NETGEAR Multiple Products

A high-severity vulnerability exists in a third-party software component, FunJSQ, used in multiple NETGEAR router and Orbi WiFi products.

Executive summary

A high-severity vulnerability exists in a third-party software component, FunJSQ, used in multiple NETGEAR router and Orbi WiFi products. This flaw exposes an unsecured web server on the local network, allowing an attacker on the same network to potentially compromise the device. Successful exploitation could lead to unauthorized access, interception of network traffic, or disruption of network services.

Vulnerability

The FunJSQ third-party module, integrated into the firmware of affected NETGEAR devices, improperly initializes an HTTP server that is accessible from the local area network (LAN) interface. An attacker who has already gained access to the LAN (e.g., via a compromised endpoint or as a malicious insider) can send specially crafted HTTP requests to this exposed server. Depending on the functions exposed by the server, this could allow the attacker to retrieve sensitive information, alter device configurations, or potentially execute arbitrary code on the underlying operating system of the router.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.7. Exploitation of this flaw could have a significant business impact by compromising a critical piece of network infrastructure. An attacker could gain control over the organization's network gateway, leading to loss of confidentiality through traffic interception, loss of integrity by redirecting users to malicious websites (DNS hijacking), and loss of availability by causing a denial-of-service condition. A compromised router also serves as a powerful pivot point for an attacker to launch further attacks against other sensitive systems on the internal network.

Remediation

Immediate Action: Apply the security updates provided by NETGEAR to all affected devices immediately. After patching, review device access and system logs for any unusual connections or configuration changes that may have occurred prior to remediation.

Proactive Monitoring: Monitor network traffic for unusual HTTP requests directed at the internal IP addresses of NETGEAR devices from other clients on the LAN. In device system logs, look for anomalous entries, unexpected process activity related to FunJSQ, or unauthorized configuration changes. Configure network monitoring tools to alert on any attempts to connect to non-standard ports on network infrastructure devices.

Compensating Controls: If patching is not immediately possible, implement network segmentation to isolate critical systems from less trusted networks (e.g., guest Wi-Fi, IoT devices). Use access control lists (ACLs) to restrict communication to the router's management interfaces to only authorized administrative workstations. Ensure all endpoints on the network are protected with up-to-date security software to prevent the initial compromise that would grant an attacker LAN access.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the High severity rating (CVSS 7.7) and the existence of public exploit code, this vulnerability poses a significant risk to the organization. All affected NETGEAR products must be identified and patched immediately to prevent exploitation. If immediate patching is not feasible, the compensating controls outlined above should be implemented as a temporary measure to reduce the attack surface. Due to the critical role these devices play in network security, their compromise would be highly impactful, and therefore remediation should be treated as a top priority.