1.0 Introduction
Recently, NETGEAR has issued security advisories addressing two high-severity vulnerabilities in the XR1000 and XR1000v2 router models.
2.0 Impact
A remote attacker could exploit some of these vulnerabilities to trigger cross-site scripting, data manipulation, sensitive information disclosure, remote code execution, elevation of privilege, denial of service condition and security restriction bypass on the targeted system
3.0 Affected Products
- NETGEAR XR1000 versions prior to 1.0.0.74
- NETGEAR XR1000v2 versions prior to 1.1.1.22
4.0 Recommendation
CyberSecurity Malaysia urges users and organisations to review the NETGEAR security updates , follow the Mitigation steps and apply the necessary updates.
Kindly refer to the URL for more information:
- https://kb.netgear.com/000066409/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2023-0109
- https://kb.netgear.com/000066408/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-PSV-2023-0117
Generally, Cyber999 advises the users of these devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17.30 MYT
Web:
https://www.mycert.org.my
5.0 References