Associated CVE IDs: None
Associated ZDI ID: ZDI-CAN-11851
NETGEAR has released fixes for a stack-based buffer overflow remote code execution security vulnerability on the following product models:
- D6220 running firmware versions prior to 1.0.0.68
- D6400 running firmware versions prior to 1.0.0.102
- D7000v2 running firmware versions prior to 1.0.0.66
- D8500 running firmware versions prior to 1.0.3.60
- DC112A running firmware versions prior to 1.0.0.54
- EX7000 running firmware versions prior to 1.0.1.94
- EX7500 running firmware versions prior to 1.0.0.72
- R6250 running firmware versions prior to 1.0.4.48
- R6300v2 running firmware versions prior to 1.0.4.50
- R6400 running firmware versions prior to 1.0.1.68
- R6400v2 running firmware versions prior to 1.0.4.102
- R6700v3 running firmware versions prior to 1.0.4.102
- R6900P running firmware versions prior to 1.3.2.132
- R7000 running firmware versions prior to 1.0.11.116
- R7000P running firmware versions prior to 1.3.2.132
- R7100LG running firmware versions prior to 1.0.0.64
- R7850 running firmware versions prior to 1.0.5.68
- R7900 running firmware versions prior to 1.0.4.38
- R7900P running firmware versions prior to 1.4.1.68
- R7960P running firmware versions prior to 1.4.1.68
- R8000 running firmware versions prior to 1.0.4.68
- R8000P running firmware versions prior to 1.4.1.68
- R8300 running firmware versions prior to 1.0.2.144
- R8500 running firmware versions prior to 1.0.2.144
- RAX200 running firmware versions prior to 1.0.2.88
- RAX75 running firmware versions prior to 1.0.3.102
- RAX80 running firmware versions prior to 1.0.3.102
- RBR750 running firmware versions prior to 3.2.17.12
- RBR850 running firmware versions prior to 3.2.17.12
- RBS40V running firmware versions prior to 2.6.2.4
- RBS750 running firmware versions prior to 3.2.17.12
- RBS850 running firmware versions prior to 3.2.17.12
- RS400 running firmware versions prior to 1.5.1.80
- WNDR3400v3 running firmware versions prior to 1.0.1.38
- WNR3500Lv2 running firmware versions prior to 1.2.0.66
- XR300 running firmware versions prior to 1.0.3.56
Note: NETGEAR released multiple hardware versions of some of the affected products. A hardware version is denoted by “v” and a number following the product model. For example, R6700v3 is a different product from R6700v2. If a model number does not have a hardware version number after it, then it is hardware version 1. R6700 means the same thing as R6700v1. If you’re not sure what model you have, check the label on the back or bottom of your NETGEAR product.
NETGEAR strongly recommends that you download the latest firmware fixes as soon as possible. Firmware fixes are currently available for all affected products.
To download the latest firmware for your NETGEAR product:
- Visit NETGEAR Support.
- Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
- Click Downloads.
- Under Current Versions, select the first download whose title begins with Firmware Version.
- Click Release Notes.
- Follow the instructions in the firmware release notes to download and install the new firmware.
Disclaimer
This document is provided on an "as is" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. NETGEAR reserves the right to change or update this document at any time. NETGEAR expects to update this document as new information becomes available.
The stack-based buffer overflow remote code execution vulnerability remains if you do not complete all recommended steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification.
Acknowledgements
Trend Micro's Zero Day Initiative
Common Vulnerability Scoring System
Rating: High
Score: 8.8
Vector: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Best Practices for Updating Firmware
We recommend that you keep your NETGEAR devices up to date with the latest firmware. Firmware updates contain security fixes, bug fixes, and new features for your NETGEAR products.
If your product is supported by one of our apps, using the app is the easiest way to update your firmware:
- Orbi products: NETGEAR Orbi app
- NETGEAR WiFi routers: NETGEAR Nighthawk app
- Some NETGEAR Business products: NETGEAR Insight app (firmware updates through the app are available only for Insight subscribers)
If your product is not supported by one of our apps, you can always update your firmware manually by following the instructions in your product’s user manual, firmware release notes, or product support page. For more information, see Where can I find information about my NETGEAR product?.
Contact
We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.
It is NETGEAR's mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.
To report a security vulnerability, visit https://bugcrowd.com/netgear.
If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at techsupport.security@netgear.com.
For all other issues, visit http://www.netgear.com/about/security/.
Revision History
2021-01-21: Published advisory
2021-11-09:
- Updated from hotfix to production release available: RS400
- Removed hotfix language
Last Updated:11/09/2021
|
Article ID: 000062820