Associated ZDI ID: ZDI-CAN-10754
NETGEAR has released fixes for an authentication bypass security vulnerability on the following product models:
- R6020, running firmware versions prior to 1.0.0.44
- R6080, running firmware versions prior to 1.0.0.44
- R6120, running firmware versions prior to 1.0.0.70
- R6220, running firmware versions prior to 1.1.0.100
- R6230, running firmware versions prior to 1.1.0.100
- R6260, running firmware versions prior to 1.1.0.76
- R6330, running firmware versions prior to 1.1.0.76
- R6350, running firmware versions prior to 1.1.0.76
- R6850, running firmware versions prior to 1.1.0.76
NETGEAR strongly recommends that you download the latest firmware as soon as possible.
To download the latest firmware for your NETGEAR product:
- Visit NETGEAR Support.
- Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
- Click Downloads.
- Under Current Versions, select the download whose title begins with Firmware Version.
- Click Download.
- Follow the instructions in your product’s user manual, firmware release notes, or product support page to install the new firmware.
The following product models are also affected by the authentication bypass vulnerability, but are outside the security support period:
If your product is outside the security support period, we recommend that you follow the workaround procedure listed in this advisory. We also recommend that you follow the guidance of the United States Cybersecurity and Infrastructure Security Agency (CISA): “[CISA] encourages users and administrators to update to the most recent firmware version and to replace end-of-life devices that are no longer supported with security patches.”
Workaround
Turning off Remote Management on your router web user interface significantly reduces your risk of exposure to these vulnerabilities. Remote Management on your router or gateway’s web user interface is turned off by default. If you never enabled Remote Management, you do not need to take any action to turn off Remote Management.
For instructions, see How do I turn off Remote Management on my NETGEAR router or gateway?.
Disclaimer
This document is provided on an "as is" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. NETGEAR reserves the right to change or update this document at any time. NETGEAR expects to update this document as new information becomes available.
The authentication bypass vulnerability remains if you do not complete all recommended steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification.
Acknowledgements
Anonymous working with Trend Micro's Zero Day Initiative
Common Vulnerability Scoring System
CVSS v3.1 Rating: Medium
CVSS v3.1 Score: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Best Practices for Updating Firmware
We recommend that you keep your NETGEAR devices up to date with the latest firmware. Firmware updates contain security fixes, bug fixes, and new features for your NETGEAR products.
If your product is supported by one of our apps, using the app is the easiest way to update your firmware:
- Orbi products: NETGEAR Orbi app
- Some Nighthawk products: NETGEAR Nighthawk app
- Some NETGEAR for Business products: NETGEAR Insight app (firmware updates through the app are available only for Insight subscribers)
If your product is not supported by one of our apps, you can always update your firmware manually by following the instructions in your product’s user manual, firmware release notes, or product support page. For more information, see Where can I find information about my NETGEAR product?.
Contact
We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.
It is NETGEAR's mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.
To report a security vulnerability, visit http://www.netgear.com/about/security/.
If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at techsupport.security@netgear.com.
Revision History
2020-09-14:
- Published advisory
- Added a workaround for models outside the security support period
Last Updated:09/15/2020
|
Article ID: 000062304