Security Advisory for Post-Authentication Command Injection on Some Routers and Gateways, PSV-2018-0352

Overview :
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7000v2 before 1.0.0.53, D8500 before 1.0.3.44, R6220 before 1.1.0.80, R6250 before 1.0.4.34, R6260 before 1.1.0.64, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6700v3 before 1.0.2.66, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7800 before 1.0.2.60, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.32.

CVE-2020-11770

Security Advisory for Post-Authentication Command Injection on Some Routers and Gateways, PSV-2018-0352

Associated CVE IDs: None

NETGEAR has released fixes for a post-authentication command injection security vulnerability on the following product models:

  • D6220, running firmware versions prior to 1.0.0.52
  • D6400, running firmware versions prior to 1.0.0.86
  • D7000v2, running firmware versions prior to 1.0.0.53
  • D8500, running firmware versions prior to 1.0.3.44
  • R6220, running firmware versions prior to 1.1.0.80
  • R6250, running firmware versions prior to 1.0.4.34
  • R6260, running firmware versions prior to 1.1.0.64
  • R6400, running firmware versions prior to 1.0.1.46
  • R6400v2, running firmware versions prior to 1.0.2.66
  • R6700, running firmware versions prior to 1.0.2.6
  • R6700v2, running firmware versions prior to 1.2.0.36
  • R6700v3, running firmware versions prior to 1.0.2.66
  • R6800, running firmware versions prior to 1.2.0.36
  • R6900, running firmware versions prior to 1.0.2.4
  • R6900P, running firmware versions prior to 1.3.1.64
  • R6900v2, running firmware versions prior to 1.2.0.36
  • R7000, running firmware versions prior to 1.0.9.42
  • R7000P, running firmware versions prior to 1.3.1.64
  • R7100LG, running firmware versions prior to 1.0.0.50
  • R7300DST, running firmware versions prior to 1.0.0.70
  • R7800, running firmware versions prior to 1.0.2.60
  • R7900, running firmware versions prior to 1.0.3.8
  • R7900P, running firmware versions prior to 1.4.1.30
  • R8000, running firmware versions prior to 1.0.4.28
  • R8000P, running firmware versions prior to 1.4.1.30
  • R8300, running firmware versions prior to 1.0.2.128
  • R8500, running firmware versions prior to 1.0.2.128
  • R8900, running firmware versions prior to 1.0.4.12
  • R9000, running firmware versions prior to 1.0.4.12
  • XR500, running firmware versions prior to 2.3.2.32

NETGEAR strongly recommends that you download the latest firmware as soon as possible.

To download the latest firmware for your NETGEAR product:

  1. Visit NETGEAR Support.
  2. Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
    If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
  3. Click Downloads.
  4. Under Current Versions, select the download whose title begins with Firmware Version.
  5. Click Download.
  6. Follow the instructions in your product’s user manual, firmware release notes, or product support page to install the new firmware.

Disclaimer

This document is provided on an “as is” basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. NETGEAR reserves the right to change or update this document at any time. NETGEAR expects to update this document as new information becomes available.

The post-authentication command injection vulnerability remains if you do not complete all recommended steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification.

Acknowledgements

Common Vulnerability Scoring System

CVSS v3 Rating: High

CVSS v3 Score: 8

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Contact

We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.

It is NETGEAR’s mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.

To report a security vulnerability, visit http://www.netgear.com/about/security/.

If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at techsupport.security@netgear.com.

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-53144 : LINUX KERNEL UP TO 6.1.112/6.6.54/6.10.13/6.11.2 HCI_EVENT PRIVILEGE ESCALATION

CVE-2024-53144 : LINUX KERNEL UP TO 6.1.112/6.6.54/6.10.13/6.11.2 HCI_EVENT PRIVILEGE ESCALATION

Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE This

CVE-2024-50379 : APACHE TOMCAT UP TO 9.0.97/10.1.33/11.0.1 JSP COMPILATION TOCTOU

CVE-2024-50379 : APACHE TOMCAT UP TO 9.0.97/10.1.33/11.0.1 JSP COMPILATION TOCTOU

Description Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file

CVE-2024-10205 : HITACHI OPS CENTER ANALYZER ON LINUX 64-BIT MISSING AUTHENTICATION

CVE-2024-10205 : HITACHI OPS CENTER ANALYZER ON LINUX 64-BIT MISSING AUTHENTICATION

Description Authentication Bypass vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component),