CVE-2024-57046
Published: 18 February 2025
Summary
CVE-2024-57046 is a high-severity Improper Authentication (CWE-287) vulnerability in Netgear Dgn2200 Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 2.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Explicitly defines and limits actions permitted without identification or authentication, directly preventing the router from treating crafted URLs like '?x=1.gif' as authenticated.
Enforces approved access authorizations, blocking unauthorized access to router administrative functions despite the authentication bypass vulnerability.
Mandates identification, reporting, and correction of flaws such as this CVE through firmware updates to eliminate the authentication bypass.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes an authentication bypass vulnerability in the Netgear DGN2200 router's web management interface via a URL parameter (?x=1.gif), enabling exploitation of a public-facing application to gain unauthorized administrative access.
NVD Description
A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding "?x=1.gif" to the the requested url, it will be recognized as passing the authentication.
Deeper analysisAI
CVE-2024-57046 is an authentication bypass vulnerability (CWE-287) in the Netgear DGN2200 router running firmware version v1.0.0.46 and earlier. The flaw allows unauthorized individuals to circumvent authentication by appending "?x=1.gif" to any requested URL, causing the router to treat the request as authenticated.
Attackers on an adjacent network (AV:A) can exploit this with low complexity (AC:L), no required privileges (PR:N), and no user interaction (UI:N). Successful exploitation provides high-impact access to confidentiality, integrity, and availability (C:H/I:H/A:H), with a CVSS v3.1 base score of 8.8, enabling potential full administrative control of the device.
Advisories and mitigation guidance are detailed in the GitHub security report at https://github.com/Shuanunio/CVE_Requests/blob/main/Netgear/DGN2200/ACL%20bypass%20Vulnerability%20in%20Netgear%20DGN2200.md and on Netgear's security portal at https://www.netgear.com/about/security/.
Details
- CWE(s)