This security advisory addresses the following CVE and ZDI IDs: CVE-2020-15634, ZDI-CAN-9755.
NETGEAR has released a fix for a pre-authentication command injection security vulnerability on the following product:
- CBK40, running firmware versions prior to 2.5.0.10
- CBK43, running firmware versions prior to 2.5.0.10
- CBR40, running firmware versions prior to 2.5.0.10
- D6220, running firmware versions prior to 1.0.0.60
- D6400, running firmware versions prior to 1.0.0.94
- D7000v2, running firmware versions prior to 1.0.0.62
- D8500, running firmware versions prior to 1.0.3.50
- DC112A, running firmware versions prior to 1.0.0.48
- DGN2200v4, running firmware versions prior to 1.0.0.114
- EAX20, running firmware versions prior to 1.0.0.36
- EAX80, running firmware versions prior to 1.0.1.62
- EX3700, running firmware versions prior to 1.0.0.84
- EX3800, running firmware versions prior to 1.0.0.84
- EX3920, running firmware versions prior to 1.0.0.84
- EX6000, running firmware versions prior to 1.0.0.44
- EX6100, running firmware versions prior to 1.0.2.28
- EX6120, running firmware versions prior to 1.0.0.54
- EX6130, running firmware versions prior to 1.0.0.36
- EX6150, running firmware versions prior to 1.0.0.46
- EX6200, running firmware versions prior to 1.0.3.94
- EX6920, running firmware versions prior to 1.0.0.54
- EX7000, running firmware versions prior to 1.0.1.90
- EX7500, running firmware versions prior to 1.0.0.68
- MK62, running firmware versions prior to 1.0.5.102
- MR60, running firmware versions prior to 1.0.5.102
- MS60, running firmware versions prior to 1.0.5.102
- R6250, running firmware versions prior to 1.0.4.42
- R6300v2, running firmware versions prior to 1.0.4.42
- R6400, running firmware versions prior to 1.0.1.62
- R6400v2, running firmware versions prior to 1.0.4.98
- R6700, running firmware versions prior to 1.0.2.16
- R6700v3, running firmware versions prior to 1.0.4.98
- R6900, running firmware versions prior to 1.0.2.16
- R7000, running firmware versions prior to 1.0.11.106
- R6900P, running firmware versions prior to 1.3.2.124
- R7000P, running firmware versions prior to 1.3.2.124
- R7100LG, running firmware versions prior to 1.0.0.56
- R7850, running firmware versions prior to 1.0.5.60
- R7900, running firmware versions prior to 1.0.4.26
- R7960P, running firmware versions prior to 1.4.1.64
- R8000, running firmware versions prior to 1.0.4.58
- R7900P, running firmware versions prior to 1.4.1.62
- R8000P, running firmware versions prior to 1.4.1.62
- R8300, running firmware versions prior to 1.0.2.134
- R8500, running firmware versions prior to 1.0.2.134
- RAX15, running firmware versions prior to 1.0.1.64
- RAX20, running firmware versions prior to 1.0.1.64
- RAX200, running firmware versions prior to 1.0.2.102
- RAX45, running firmware versions prior to 1.0.2.32
- RAX50, running firmware versions prior to 1.0.2.32
- RAX75, running firmware versions prior to 1.0.3.102
- RAX80, running firmware versions prior to 1.0.3.102
- RBK752, running firmware versions prior to 3.2.16.6
- RBR7500, running firmware versions prior to 3.2.16.6
- RBS750, running firmware versions prior to 3.2.16.6
- RBK842, running firmware versions prior to 3.2.16.6
- RBR840, running firmware versions prior to 3.2.16.6
- RBS840, running firmware versions prior to 3.2.16.6
- RBK852, running firmware versions prior to 3.2.16.6
- RBR850, running firmware versions prior to 3.2.16.6
- RBS850, running firmware versions prior to 3.2.16.6
- RBS40V, running firmware versions prior to 2.5.1.6
- RBS40V-200, running firmware versions prior to 1.0.0.46
- RBW30, running firmware versions prior to 2.5.0.4
- RS400, running firmware versions prior to 1.5.0.48
- WN2500RPv2, running firmware versions prior to 1.0.1.56
- WNDR3400v3, running firmware versions prior to 1.0.1.32
- WNR1000v3, running firmware versions prior to 1.0.2.78
- WNR2000v2, running firmware versions prior to 1.2.0.12
- WNR3500Lv2, running firmware versions prior to 1.2.0.62
- XR300, running firmware versions prior to 1.0.3.50
NETGEAR strongly recommends that you download the latest firmware as soon as possible.
To download the latest firmware for your NETGEAR product:
- Visit NETGEAR Support.
- Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
- Click Downloads.
- Under Current Versions, select the first download whose title begins with Firmware Version.
- Click Release Notes.
- Follow the instructions in the firmware release notes to download and install the new firmware.
NETGEAR will update this advisory when more information is available.
Disclaimer
This document is provided on an "as is" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. NETGEAR reserves the right to change or update this document at any time. NETGEAR expects to update this document as new information becomes available.
The pre-authentication command injection vulnerability remains if you do not complete all recommended steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification.
Acknowledgements
d4rkn3ss from VNPT ISC working with Trend Micro’s Zero Day Initiative
Common Vulnerability Scoring System Vector
CVSS v3.1 Rating: Medium
CVSS v3.1 Score: 6.3
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Contact
We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.
It is NETGEAR's mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.
To report a security vulnerability, visit https://bugcrowd.com/netgear.
If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at techsupport.security@netgear.com.
For all other issues, visit http://www.netgear.com/about/security/.
Revision History
2020-07-28: Published advisory
2020-07-30:
- Edited acknowledgment at researcher's request
- Added CVE ID and ZDI ID
2020-12-22:
Added the following models to the advisory: CBR40, D6220, D6400, D7000v2, D8500, DC112A, DGN2200v4, EAX20, EAX80, EX3700, EX3800, EX3920, EX6000, EX6100, EX6120, EX6130, EX6150, EX6200, EX6920, EX7000, EX7500, MK62, MR60, MS60, R6250, R6300v2, R6400, R6400v2, R6700, R6900, R7000, R6900P, R7000P, R7100LG, R7850, R7900, R7960P, R8000, R7900P, R8000P, R8300, R8500, RAX15, RAX20, RAX200, RAX45, RAX50, RAX75, RAX80, RBK842, RBR840, RBS850, RBK752, RBR750, RBS750, RBS40V, RBS40V-200,RBW30, RS400, WN2500RPv2, WNDR3400v3, WNR1000v3, WNR2000v2, WNR3500Lv2, and XR300
2020-12-25:
- Added updated production firmware for R7960P
- Added the following models for the advisory: CBK40 and CBK43
Last Updated:12/25/2020
|
Article ID: 000062126