Full Disclosure mailing list archives

Re: Netgear GS105Ev2 - Multiple Vulnerabilities


From: Nick Boyce <nick.boyce () gmail com>
Date: Mon, 8 Feb 2016 21:23:26 +0000

On 27 January 2016 at 15:56, Benedikt Westermann
<benedikt.westermann () i-sec tuv com> wrote:

# Multiple Vulnerabilities - Netgear GS105Ev2
[...]
Firmware version: 1.3.0.3,1.4.0.2
[...]
Status: unfixed
CVSS v2 Vector: (AV:A/AC:L/Au:N/C:C/I:C/A:C)
CVSS Score:     8.3
CVE-ID: n/A

The highest risk is represented by the authentication bypass.
This is reflected by the score.

## Author/Credits
Benedikt Westermann (TÜV Rheinland i-sec GmbH)
[...]
## History

10.08.2015 - Initial contact to Netgear via support chat
10.08.2015 - Set preliminary disclosure date
11.08.2015 - Netgear Support confirms findings
01.09.2015 - Netgear Support informs that currently no immediate plans exist to fix the issues
27.01.2016 - Public disclosure

Hi Benedikt,

The Netgear website [1] shows that a new version of the firmware was
released 2 days after your FD post - version 1.4.0.6.

The release notes [2] for the new version don't refer to these
security issues in any way (instead they mention three fairly
minor-sounding bugs fixed).  Have you had a chance to test the new
version yet, and if so can you say whether - despite Netgear's stated
stance of WONTFIX - any of the security issues you report here are
fixed by it ?

[1] http://downloadcenter.netgear.com/de/product/GS105Ev2
[2] http://kb.netgear.com/app/answers/detail/a_id/30259

[ I was thinking about buying one of these ProSafe Plus switches, but
perhaps won't if their support attitude is so poor :-) ]

Thanks,
Nick Boyce

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Current thread: