A vulnerability in Netgear routers and modems could potentially allow hackers to gain full control of affected devices, according to a new report.
The exploit could allow attackers to bypass authentication via a device’s password recovery system. This, in turn, could allow them to gain full administrative access to the router or modem and its settings, according to Simon Kenin, a Trustwave security researcher who first discovered the exploit. Worryingly, the security hole could affect hundreds of thousands, if not over a million devices, Kenin wrote in a Jan. 30 blog post. Trustwave has since reported the exploit to the U.S. National Vulnerability Database.
Luckily, the exploit can only be done remotely if a certain remote administration setting is turned on — and it’s normally off by default, Kenin said. Still, attackers with physical access to a network running on a vulnerable router — such as public Wi-Fi networks in coffee shops, libraries and businesses — can use the security hole.
What’s worrisome about the security hole, Kenin writes, is that attackers could potentially use exploited devices at botnets to initiate large-scale hacking, like October’s 2016 DDoS attacks. In that case, hackers uses affected webcams and DVRs with easy-to-guess default passwords to create an “army” of resources that they used to cause widespread internet disruptions.
Netgear is aware of the exploit, and has already released an updated firmware patch on its website that closes the security hole. In addition, the company posted this list of affected devices. If you see your model on the list below, it’s strongly recommended that you update your firmware.
- R8500
- R8300
- R7000
- R6400
- R7300DST
- R7100LG
- R6300v2
- WNDR3400v3
- WNR3500Lv2
- R6250
- R6700
- R6900
- R8000
- R7900
- WNDR4500v2
- R6200v2
- WNDR3400v2
- D6220
- D6400
- C6300
Additionally, Netgear released a list of routers and DSL gateways running on certain firmware versions that do not have an available fix. For owners of these devices, Netgear recommends that users manually enable password recovery features and disable remote management. Those devices include:
- R6200 on v1.0.1.56_1.0.43
- R6300 on v1.0.2.78_1.0.58
- VEGN2610 on v1.0.0.14_1.0.12
- AC1450 on v1.0.0.34_10.0.16
- WNR1000v3 on v1.0.2.68_60.0.93
- WNDR3700v3 on v1.0.0.38_1.0.31
- WNDR4000 on v1.0.2.4_9.1.86
- WNDR4500 on v1.0.1.40_1.0.68
- D6300 on v1.0.0.96
- D6300B on v1.0.0.40
- DGN2200Bv4 on v1.0.0.68
- DGN2200v4 on v1.0.0.76
Want a FREE iPhone 7? Click here to enter our monthly contest for a chance!
Follow us on Apple News by pressing the (+) button at the top of our channel
from http://ift.tt/2keaf3C
via IFTTT
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.