NETGEAR is aware of a security issue that can allow an attacker to access the debugging URL of some models of Smart and Managed Switches without first authenticating. After accessing the debugging URL, the attacker can then execute commands on the switch, such as resetting or restarting the switch. This attack can only be executed remotely if the switch itself can be accessed remotely; for most users, a firewall will block access from outside the local network.
This vulnerability affects the following products:
- FS752TP, firmware version 5.4.2.19 and earlier
- GS108Tv2, firmware version 5.4.2.29 and earlier
- GS110TP, firmware version 5.4.2.29 and earlier
- GS418TPP, firmware version 6.6.2.6 and earlier
- GS510TLP, firmware version 6.6.2.6 and earlier
- GS510TP, firmware version 5.04.2.27 and earlier
- GS510TPP, firmware version 6.6.2.6 and earlier
- GS716Tv2, firmware version 5.4.2.27 and earlier
- GS716Tv3, firmware version 6.3.1.16 and earlier
- GS724Tv3, firmware version 5.4.2.27 and earlier
- GS724Tv4, firmware version 6.3.1.16 and earlier
- GS728TPSB, firmware version 5.3.0.29 and earlier
- GS728TSB, firmware version 5.3.0.29 and earlier
- GS728TXS, firmware version 6.1.0.35 and earlier
- GS748Tv4, firmware version 5.4.2.27 and earlier
- GS748Tv5, firmware version 6.3.1.16 and earlier
- GS752TPSB, firmware version 5.3.0.29 and earlier
- GS752TSB, firmware version 5.3.0.29 and earlier
- GS752TXS, firmware version 6.1.0.35 and earlier
- M4200, firmware version 12.0.2.10 and earlier
- M4300, firmware version 12.0.2.10 and earlier
- M5300, firmware version 11.0.0.28 and earlier
- M6100, firmware version 11.0.0.28 and earlier
- M7100, firmware version 11.0.0.28 and earlier
- S3300, firmware version 6.6.1.4 and earlier
- XS708T, firmware version 6.6.0.11 and earlier
- XS712T, firmware version 6.1.0.34 and earlier
- XS716T, firmware version 6.6.0.11 and earlier
Firmware fixes are currently available for all affected products. NETGEAR strongly recommends that you upgrade to the firmware version that fixes the authentication bypass and remote command execution vulnerability as soon as possible.
To download the firmware update that fixes the remote command execution vulnerability:
- Visit NETGEAR Support.
- Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
- Click Downloads.
- Under Current Versions, select the download whose title begins with Firmware Version.
- If you see a Release Notes link, click it and follow the instructions in the release notes to download and install the new firmware.
- If you do not see a Release Notes link or if you do not see instructions in the release notes, click Download to download the new firmware.
- Follow the firmware upgrade instructions in your Software Administration Guide or Software Administration Manual, which is available on your product’s Support page under User Guides and Documentation.
The potential for authentication bypass and remote command execution remains if you do not update your firmware. NETGEAR is not responsible for any consequences that could have been avoided by updating your firmware as recommended in this notification.
We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.
It is NETGEAR's mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.
To report a security vulnerability, visit https://bugcrowd.com/netgear.
If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at techsupport.security@netgear.com.
For all other issues, visit http://www.netgear.com/about/security/.
Last Updated:09/06/2017
|
Article ID: 000038519