Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/1/2017
06:38 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Netgear Addresses Password Bypass Vulns In 31 Router Models

Company has made patches, workarounds available to mitigate password bypass threat that potentially impacted 1 million devices, Trustwave says.

A warning this week about security vulnerabilities in more than two-dozen models of Netgear routers has once again focused attention on the broad threat posed to consumers and enterprises from insecure home routers.

In an alert Monday, security vendor Trustwave said it had found two vulnerabilities in several Netgear routers that give attackers a way to either discover or to bypass any password on the devices.

The flaws, which are present in 31 different Netgear models, allow attackers to take complete control of vulnerable devices and to change their configurations, upload rogue firmware on them, or turn the devices into remotely controlled bots.

Anywhere from 10,000 devices to potentially one million Netgear routers have the vulnerabilities in them, according to Trustwave.

Routers provide a large attack surface and can offer a number of options for the hacker to take advantage of, says Jon Clay, director of global threat communications at Trend Micro, which this week issued a warning of its own about growing attacks against the devices.

Router vulnerabilities can be exploited to attack the systems behind the router or they could be used to turn the devices into bots for use in distributed denial-of-service attacks, Clay says.  “Due to the lack of experience in IT security of the consumers who use these routers, many are not set up properly and can be hacked.”

Concerns over router security have grown following the massive Mirai botnet-enabled distributed denial-of-service attacks against DNS provider Dyn and numerous others last year.

The attacks were demonstrated how easily adversaries can take advantage of vulnerabilities in ordinary network-connected consumer devices such as routers, and webcams and turn the devices into bots for attacking other systems.

With consumers expected to connect tens of billions of such devices to the Internet over the next few years, many expect the problem to get a lot worse soon.

Simon Kenin, author of the Trustwave alert and a security researcher with the company’s SpiderLabs team, said the vulnerabilities in Netgear’s products can be exploited by a remote attacker if remote administration on the device is set to be Internet-facing.

Even though the setting is usually not turned on by default, anyone with physical access to a vulnerable router—including those at public wireless hotspots such as cafes and libraries—can exploit the vulnerabilities locally, Kenin said.

Netgear has issued patches for most of the vulnerable models or has provided workarounds to mitigate the threat for older models.

This is the second major bug disclosure involving Netgear routers in recent weeks. In December, Netgear reported an arbitrary command injection flaw in 11 of its routers that gave attackers a way to execute arbitrary root-level commands on them.

One reason why routers are popular targets for attackers is because all network traffic goes through them, says Karl Sigler, threat intelligence manager at Trustwave’s SpiderLabs. “If you control the gateway you control all traffic going through it.”

The Mirai attacks have heightened the need for router vendors to ensure their products are not so easily hackable, Sigler says. “I would love to see more routers with automatic updates available,” he says.

“Since routers are usually out of sight, so, out of mind, they often go unpatched even when a patch is available.”

Significantly, there is no big difference in the security between enterprise routers and those meant for consumer and home use, Sigler adds. “I would say they are typically equally vulnerable although enterprise routers, having a dedicated network team managing them, are probably more likely to be kept up to date.”

Related stories:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16246
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
CVE-2019-17358
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
CVE-2019-17428
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.
CVE-2019-18345
PUBLISHED: 2019-12-12
A reflected XSS issue was discovered in DAViCal through 1.1.8. It echoes the action parameter without encoding. If a user visits an attacker-supplied link, the attacker can view all data the attacked user can view, as well as perform all actions in the name of the user. If the user is an administrat...
CVE-2019-19198
PUBLISHED: 2019-12-12
The Scoutnet Kalender plugin 1.1.0 for WordPress allows XSS.