Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12943: CWE-295 Improper Certificate Validation in NETGEAR RAX30

0
Medium
VulnerabilityCVE-2025-12943cvecve-2025-12943cwe-295
Published: Tue Nov 11 2025 (11/11/2025, 16:17:44 UTC)
Source: CVE Database V5
Vendor/Project: NETGEAR
Product: RAX30

Description

Improper certificate validation in firmware update logic in NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router) allows attackers with the ability to intercept and tamper traffic destined to the device to execute arbitrary commands on the device. Devices with automatic updates enabled may already have this patch applied. If not, please check the firmware version and update to the latest. Fixed in: RAX30 firmware 1.0.14.108 or later. RAXE300 firmware 1.0.9.82 or later

AI-Powered Analysis

AILast updated: 11/18/2025, 17:11:43 UTC

Technical Analysis

CVE-2025-12943 is a vulnerability classified under CWE-295 (Improper Certificate Validation) found in the firmware update logic of NETGEAR RAX30 (Nighthawk AX5 5-Stream AX2400 WiFi 6 Router) and RAXE300 (Nighthawk AXE7800 Tri-Band WiFi 6E Router). The core issue is that the devices do not correctly validate the authenticity of certificates during the firmware update process. This improper validation allows an attacker with the capability to intercept and manipulate network traffic—such as via a man-in-the-middle (MitM) attack—to inject malicious firmware or commands. Successful exploitation leads to arbitrary command execution on the device, potentially allowing full control over the router. The vulnerability is particularly dangerous because it does not require any authentication or user interaction, only network access sufficient to intercept traffic destined for the device. The CVSS v4.0 score is 5.2 (medium), reflecting the attack vector as adjacent network, low attack complexity, no privileges required, and no user interaction, but with high impact on confidentiality, integrity, and availability. NETGEAR has addressed this issue in firmware versions 1.0.14.108 for RAX30 and 1.0.9.82 for RAXE300. Devices with automatic updates enabled may already be patched, but manual verification and updating are recommended. No known exploits have been reported in the wild as of now.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure security, especially in environments where NETGEAR RAX30 or RAXE300 routers are deployed. Exploitation could lead to unauthorized control over routers, enabling attackers to intercept, modify, or redirect network traffic, potentially compromising sensitive data confidentiality and integrity. It could also disrupt network availability by causing device malfunction or denial of service. Given the widespread use of these routers in small to medium enterprises and home office setups, the vulnerability could serve as a foothold for lateral movement into corporate networks. The ability to execute arbitrary commands without authentication increases the risk of persistent compromise and deployment of further malware or ransomware. The threat is exacerbated in scenarios where network segmentation is weak or where these devices serve as primary gateways to critical systems.

Mitigation Recommendations

European organizations should immediately verify the firmware versions of all NETGEAR RAX30 and RAXE300 devices and update them to at least versions 1.0.14.108 and 1.0.9.82 respectively. For devices with automatic updates disabled, enable this feature or implement scheduled manual update checks. Network administrators should monitor network traffic for signs of MitM attacks, such as unexpected certificate changes or unusual firmware update requests. Employ network segmentation to isolate router management interfaces from general user traffic and restrict access to trusted administrators only. Use encrypted management protocols (e.g., SSH, HTTPS) and strong authentication mechanisms for router access. Additionally, consider deploying network intrusion detection systems (NIDS) to detect anomalous activities related to firmware updates. Regularly audit device configurations and logs for unauthorized changes. Finally, educate users and administrators about the risks of connecting to untrusted networks where MitM attacks are more feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
NETGEAR
Date Reserved
2025-11-10T07:35:29.116Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69136629f922b639ab601262

Added to database: 11/11/2025, 4:36:57 PM

Last enriched: 11/18/2025, 5:11:43 PM

Last updated: 11/22/2025, 7:01:10 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats