Are you using a Netgear router? Researchers have discovered a very serious security gap that affects hundreds of thousands of Netgear devices.
Η company security researcher Trustwave, reports that the vulnerability essentially allows attackers to exploit the router's password recovery system to bypass authentication and, using administrator credentials, gain full access to the device and its settings.
What is particularly worrying is that the security gap is found in at least 31 different ones models της Netgear αφήνοντας πάνω από ένα εκατομμύριο χρήστες openin attacks.
Even more worrying is the fact that these devices could in some cases be hacked remotely. As Trustwave researcher Simon Kenin explains, any router that has a remote option managements enabled it is vulnerable to hacking.
Note that remote management is disabled by default on most devices, and the company says it has found more than 10 routers that have been compromised, but the actual number could be "over a million."
Kenin also warns that anyone with physical access to a faulty Netgear router can abuse its defense mechanisms and gain access to the device by adding the router to botnets.
"The vulnerability could be exploited by a remote attacker if remote management is enabled. By default the function is not activated. However, anyone with physical access to a network with a vulnerable router can take advantage of it locally, "said the researcher.
"This includes public Wi-Fi areas, such as cafes and libraries that use vulnerable equipment."
Trustwave reported the security gap in National Vulenrability Database. The Netgear confirmed also the defect with a publication on its website, giving the full list of affected models:
- R8500
- R8300
- R7000
- R6400
- R7300DST
- R7100LG
- R6300v2
- WNDR3400v3
- WNR3500Lv2
- R6250
- R6700
- R6900
- R8000
- R7900
- WNDR4500v2
- R6200v2
- WNDR3400v2
- D6220
- D6400
- C6300 (firmware released to ISPs)