Overview : | ||||||||||
|
Security Advisory for Stored Cross Site Scripting on Some Routers and Gateways, PSV-2018-0526Associated CVE IDs: None NETGEAR has released fixes for a stored cross site scripting security vulnerability on the following product models:
NETGEAR strongly recommends that you download the latest firmware as soon as possible. To download the latest firmware for your NETGEAR product:
DisclaimerThis document is provided on an “as is” basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. NETGEAR reserves the right to change or update this document at any time. NETGEAR expects to update this document as new information becomes available. The stored cross site scripting vulnerability remains if you do not complete all recommended steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification. Acknowledgementsaircut Common Vulnerability Scoring SystemCVSS v3 Rating: Medium CVSS v3 Score: 6 Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N ContactWe appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR. It is NETGEAR’s mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity. To report a security vulnerability, visit http://www.netgear.com/about/security/. If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at techsupport.security@netgear.com. Revision History2020-03-03: Published advisory |
|