Site icon The Stack

NETGEAR pushes out 48 security advisories in 3 days

Pumpkins, NETGEAR security updates

Router and networking technology specialist NETGEAR has pushed out a hefty 48 security advisories in the past three days, as it patches a raft of bugs including a nasty looking (CVSS v3 9.8) pre-authentication command injection vulnerability in its NMS300 network management system (product sheet: “insight into network elements, including third-party devices.”)

Other issues include the following products* spilling admin credentials to the potentially malicious in another critical bug (CVSS v3 Score: 9.6)

NETGEAR security updates span a sprawling product portfolio of routers, more.

Also of note amongst the flurry of fixes, a CVSS 9.3 “authentication bypass” bug affecting a sprawling product range of routers, including:

*Note: a great many other NETGEAR products are affected by other bugs of varying severity. Firmware updates are available. Get y’selves a’patchin’.

NETGEAR has an active bug bounty programme with Bugcrowd.

The company adds in its advisory: “We appreciate and value having security concerns brought to our attention… Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.” Found more bugs? You can report them here.

Just some of December 2020’s CVEs… Credit: NIST

A tidal wave of software security vulnerabilities in general shows no signs of slowing. In 2016 just 5,579 bugs were allocated CVEs (identifiers for cybersecurity vulnerabilities). By 2019 the figure had hit 13,988. It is on track to climb over 20,000 in 2020. NIST’s National Vulnerability Database shows some 900 bugs were allocated CVEs this December alone.

See also: We got hit by ransomware. This is how it played out.

p.s. Why the pumpkins? We put “patch” into Sometimes you’ve just got to roll with things. Better than another hooded hacker, right? Image credit:

Exit mobile version