Associated CVE ID: CVE-2021-34991
Associated ZDI ID: ZDI-CAN-14110
First published: 2021-11-09
NETGEAR is aware of a pre-authentication buffer overflow security vulnerability that requires access via your local area network to be exploited. NETGEAR has released fixes for the security vulnerability on the following product models:
Extenders:
- EX3700 fixed in firmware version 1.0.0.94
- EX3800 fixed in firmware version 1.0.0.94
- EX6120 fixed in firmware version 1.0.0.66
- EX6130 fixed in firmware version 1.0.0.46
Routers:
- R6400 fixed in firmware version 1.0.1.76
- R6400v2 fixed in firmware version 1.0.4.120
- R6700v3 fixed in firmware version 1.0.4.120
- R6900P fixed in firmware version 1.3.3.148
- R7000 fixed in firmware version 1.0.11.128
- R7000P fixed in firmware version 1.3.3.148
- R7100LG fixed in firmware version 1.0.0.72
- R7850 fixed in firmware version 1.0.5.76
- R7900P fixed in firmware version 1.4.2.84
- R7960P fixed in firmware version 1.4.2.84
- R8000 fixed in firmware version 1.0.4.76
- R8000P fixed in firmware version 1.4.2.84
- R8300 fixed in firmware version 1.0.2.156
- R8500 fixed in firmware version 1.0.2.156
- RAX15 fixed in firmware version 1.0.4.100
- RAX20 fixed in firmware version 1.0.4.100
- RAX200 fixed in firmware version 1.0.5.132
- RAX35v2 fixed in firmware version 1.0.4.100
- RAX38v2 fixed in firmware version 1.0.4.100
- RAX40v2 fixed in firmware version 1.0.4.100
- RAX42 fixed in firmware version 1.0.4.100
- RAX43 fixed in firmware version 1.0.4.100
- RAX45 fixed in firmware version 1.0.4.100
- RAX48 fixed in firmware version 1.0.4.100
- RAX50 fixed in firmware version 1.0.4.100
- RAX50S fixed in firmware version 1.0.4.100
- RAX75 fixed in firmware version 1.0.5.132
- RAX80 fixed in firmware version 1.0.5.132
- RAXE450 fixed in firmware version 1.0.8.70
- RAXE500 fixed in firmware version 1.0.8.70
- RS400 fixed in firmware version 1.5.1.80
- WNDR3400v3 fixed in firmware version 1.0.1.42
- WNR3500Lv2 fixed in firmware version 1.2.0.70
- XR1000 fixed in firmware version 1.0.0.64
- XR300 fixed in firmware version 1.0.3.68
DSL Modem Routers:
- D6220 fixed in firmware version 1.0.0.76
- D6400 fixed in firmware version 1.0.0.108
- D7000v2 fixed in firmware version 1.0.0.76
- DGN2200v4 fixed in firmware version 1.0.0.126
AirCards
- DC112A fixed in firmware version 1.0.0.62
Cable Modems
- CAX80 fixed in firmware version 2.1.3.5
NETGEAR is developing and testing additional firmware fixes, which we will release as they become available.
NETGEAR strongly recommends that you download the latest firmware as soon as possible.
To download the latest firmware for your NETGEAR product:
- Visit NETGEAR Support.
- Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
- Click Downloads.
- Under Current Versions, select the first download whose title begins with Firmware Version.
- Click Release Notes.
- Follow the instructions in the firmware release notes to download and install the new firmware.
For cable products, new firmware is released by your Internet service provider after NETGEAR releases it to them. Firmware fixes for the following cable products have been released to all service providers:
To see the latest firmware version for your cable product, visit What’s the latest firmware version of my NETGEAR cable modem or modem router?.
To check your cable product’s current firmware version, follow the steps in this knowledge base article: How do I view the firmware version of my cable modem or modem router?.
Security Hotfixes
Security hotfixes are fixes that are applied on top of existing, fully tested firmware. Releasing hotfixes allows NETGEAR to quickly update existing products and streamline the firmware verification process without going through full regression testing. These hotfixes are targeted at specific security issues and should have minimal effect on other areas of the product’s code. Therefore, we do not expect that installing the hotfix will affect the regular operation of your product. Although our pre-deployment testing process did not indicate that these hotfixes would affect device operability, because full regression testing is reserved for final production firmware fixes, we always encourage our users to monitor their devices closely after installing a firmware hotfix.
Disclaimer
This document is provided on an "as is" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. NETGEAR reserves the right to change or update this document at any time. NETGEAR expects to update this document as new information becomes available.
The pre-authentication buffer overflow vulnerability remains if you do not complete all recommended steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification.
Acknowledgements
First report: anonymous working with Trend Micro Zero Day Initiative
Additional report: GRIMM
Common Vulnerability Scoring System
Rating: High
Score: 8.8
Vector: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Best Practices for Updating Firmware
We recommend that you keep your NETGEAR devices up to date with the latest firmware. Firmware updates contain security fixes, bug fixes, and new features for your NETGEAR products.
If your product is supported by one of our apps, using the app is the easiest way to update your firmware:
- Orbi products: NETGEAR Orbi app
- NETGEAR WiFi routers: NETGEAR Nighthawk app
- Some NETGEAR Business products: NETGEAR Insight app (firmware updates through the app are available only for Insight subscribers)
If your product is not supported by one of our apps, you can always update your firmware manually by following the instructions in your product’s user manual, firmware release notes, or product support page. For more information, see Where can I find information about my NETGEAR product?.
Contact
We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.
It is NETGEAR's mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.
To report a security vulnerability, visit https://bugcrowd.com/netgear.
If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at techsupport.security@netgear.com.
For all other issues, visit http://www.netgear.com/about/security/.
Revision History
2021-11-09: Published advisory
2021-11-11: Added CVE ID
2021-11-18: Updated the introduction language
2021-11-19: Corrected a typo
2021-12-20: Corrected firmware for EX6130
2022-01-04: Updated acknowlegdements
2022-04-12:
- Added XR1000
- Updated firmware for R6900P, R7000P
Last Updated:04/12/2022
|
Article ID: 000064361