Security Advisory for Multiple Vulnerabilities on Several NETGEAR Smart Switches
The Centre for Cyber security Belgium (CCB), is aware of an actively exploited vulnerability targeting those Smart Switches. A remote attacker could exploit this vulnerability to take control of a vulnerable system.
The "Demon's cries" flaw combines authentication bypass, authentication hijacking, and a third, as-yet-undisclosed vulnerability that could grant an attacker the ability to change the administrator password without actually having to know the previous password or hijack the session bootstrapping information, resulting in a full compromise of the device.
The "Draconian Fear" flaw, on the other hand, requires the attacker to either have the same IP address as the admin or be able to spoof the address through other means.. In such a scenario, the malicious party can take advantage of the fact that the Web UI relies only on the IP and a trivially guessable "userAgent" string to flood the authentication endpoint with multiple requests.
To download the latest firmware for your NETGEAR product:
- Visit NETGEAR Support.
- Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
- Click Downloads.
- Under Current Versions, select the first download whose title begins with Firmware Version.
- Click Download.
- (Optional) To view the release notes for this firmware version, click Release Notes.
- Unzip the new firmware to an easy-to-find location, such as your desktop.
The CCB advises administrators of those infrastructure NETGEAR Smart Switches to follow the advice of NETGEAR and apply the necessary updates immediately.
The CCB advises organisations to upscale monitoring and detection capabilities to detect any related suspicious activity to ensure a fast response in case of an intrusion.