Description
Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-7625 | Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2021-55 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-03T17:30:07.570Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20168
No data.
Status : Modified
Published: 2021-12-30T22:15:09.507
Modified: 2024-11-21T05:46:03.303
Link: CVE-2021-20168
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD