{"id":20759,"date":"2022-12-08T10:11:14","date_gmt":"2022-12-08T18:11:14","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/12\/08\/news-14492\/"},"modified":"2022-12-08T10:11:14","modified_gmt":"2022-12-08T18:11:14","slug":"news-14492","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/12\/08\/news-14492\/","title":{"rendered":"Update now! NetGear routers\u2019 default configuration allows remote attacks"},"content":{"rendered":"<p>NetGear has made a <a href=\"https:\/\/kb.netgear.com\/000065411\/RAX30-Firmware-Version-1-0-9-90-Hot-Fix\" target=\"_blank\">hotfix<\/a> available for its Nighthawk routers after <a href=\"https:\/\/www.tenable.com\/blog\/netgear-router-misconfiguration-opens-the-door-for-remote-attacks\" target=\"_blank\">researchers<\/a>&nbsp;found a network misconfiguration in the firmware allowed unrestricted communication with the internet facing ports of the device listening through <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2017\/12\/ipv6-its-waiting-for-you\">IPv6<\/a>.<\/p>\n<h2>No auto-update<\/h2>\n<p>The hotfix is available for the model <a href=\"https:\/\/www.netgear.com\/support\/product\/RAX30\" target=\"_blank\">RAX30<\/a>, also known as the Nighthawk AX5 5-Stream AX2400 WiFi 6 Router.<\/p>\n<p style=\"margin: 0cm 0cm 8pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif; text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/easset_upload_file81682_252068_e.png\" alt=\"NetGear nighthawk RAX30\" width=\"771\" height=\"601\" \/><\/p>\n<p style=\"margin: 0cm 0cm 8pt; line-height: 107%; font-size: 11pt; font-family: Calibri, sans-serif; text-align: center;\"><em>The NetGear Nighthawk RAX 30 (image courtesy of NetGear)<\/em><\/p>\n<p>To update your router&rsquo;s firmware, follow the instructions in your router&rsquo;s user manual, which can be found <a href=\"https:\/\/www.netgear.com\/support\/product\/RAX30.aspx?_ga=2.88427155.982397346.1670333001-1542847194.1670333001#docs\" target=\"_blank\">online<\/a>.<\/p>\n<p>Important to note is that having the &ldquo;check for updates&rdquo; or even the auto-update options enabled is not sufficient to get this hotfix. It needs to be <a href=\"https:\/\/www.downloads.netgear.com\/files\/GDC\/RAX30\/RAX30-V1.0.9.90.zip?_ga=2.52118561.982397346.1670333001-1542847194.1670333001\" target=\"_blank\">downloaded<\/a> manually and applied following the instructions.<\/p>\n<p>What other security vulnerabilities were fixed in this hotfix or in the newer <a href=\"https:\/\/kb.netgear.com\/000065427\/RAX30-Firmware-Version-1-0-9-92-Hot-Fix?language=en_US\" target=\"_blank\">1.0.9.92<\/a>&nbsp;hotfix, which also addresses security vulnerabilities, is unknown at this point.<\/p>\n<h2>Popular<\/h2>\n<p>The researchers found the bug while looking to enter <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2022\/8\/29\/announcing-pwn2own-toronto-2022-and-introducing-the-soho-smashup\">Pwn2Own Toronto<\/a>. The NetGear Nighthawk RAX30 is a popular model for home users and small businesses, which is one of the reasons why it was selected as a target for the Pwn2Own contest. Contestants set out to find previously unknown vulnerabilities in widely used software and mobile devices.<\/p>\n<p>NetGear frustrated a lot of participants by issuing the 1.0.9.90 hotfix one day before the registration deadline for Pwn2Own. The patch invalidated the submission of this vulnerability and, it seems, some others as well.<\/p>\n<h2>The vulnerability<\/h2>\n<p>The vulnerability found by the researchers and patched just before the deadline, allowed unrestricted communication with any services listening via IPv6 on the WAN (internet facing) port of the device, including SSH and Telnet operating on ports 22 and 23 respectively.<\/p>\n<p>Telnet is an application protocol used on the internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.<\/p>\n<p>Secure Shell (SSH) is a network communication protocol that enables two computers to communicate and share data.<\/p>\n<p>Although the researchers shared no further details&nbsp; about their attack chain that was crippled by the patch, having telnet and SSH available makes it very likely they could have reconfigured the router, stolen data, or at least put it out of service.<\/p>\n<p>Stay safe, everyone!<\/p>\n<hr \/>\n<p><strong>We don&rsquo;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/update-now-netgear-routers-default-configuration-allows-remote-attacks\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/exploits-and-vulnerabilities\" rel=\"category tag\">Exploits and vulnerabilities<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: NetGear<\/p>\n<p>Tags:  Nighthawk<\/p>\n<p>Tags:  remote<\/p>\n<p>Tags:  ports<\/p>\n<p>Tags:  IPv6<\/p>\n<p>NetGear has issued a hotfix that has to be installed manually, after researchers found a vulnerability that could allow remote attacks.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/update-now-netgear-routers-default-configuration-allows-remote-attacks\" title=\"Update now! NetGear routers\u2019 default configuration allows remote attacks\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/12\/update-now-netgear-routers-default-configuration-allows-remote-attacks\">Update now! NetGear routers\u2019 default configuration allows remote attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22783,17054,16037,32,28094,3001,22846],"class_list":["post-20759","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-exploits-and-vulnerabilities","tag-ipv6","tag-netgear","tag-news","tag-nighthawk","tag-ports","tag-remote"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20759"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20759\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}