Netgear has published more than 50 security advisories in the past 2 weeks related to the availability of patches for flaws in its products.
Netgear has published more than 50 security advisories in the past two weeks related to the availability of patches for vulnerabilities affecting its products, including routers, switches, network-attached storage (NAS) devices, and wireless access points.
All the flaws have been rated medium or high severity, they haven’t been tracked with CVE identifiers.
The company released 22 advisories related to issues in fully managed switches, the flaws include privilege escalation, stored and reflected XSS, denial-of-service (DoS), security misconfiguration, and directory traversal vulnerability.
The company released more than a dozen advisories for various vulnerabilities affecting some of its routers.
The list of flaws includes remote code execution, security misconfiguration, command injection, administrator credentials disclosure, authentication bypass, stack overflow, arbitrary file read, and cross-site request forgery (CSRF).
Some of the vulnerabilities also affect DSL gateways and modems.
The company published a total of 14 advisories containing details related to vulnerabilities affecting some of its ReadyNAS devices, the issues include command injections, security misconfigurations, and ten stored cross-site scripting (XSS) issues.
The Networking equipment provider also released two advisories describing command injection vulnerabilities for wireless access points.
Most of the vulnerabilities have been discovered by Netgear researchers, anyway, the company has also credited the following external experts:
Maxime Peterlin of ON-X Security for a high severity remote code execution vulnerability affecting the WNR2000v5 routers.
Martin Rakhmanov of Trustwave for a number of serious issues affecting router and modem.
Beyond Security’s SecuriTeam Secure Disclosure program for a high severity command injection flaw in ReadyNAS Surveillance.
In January, Netgear announced the launch of a bug bounty program focused on the company’s routers, security cameras and mesh Wi-Fi systems.
The bug bounty program offers rewards of up to $15,000 per vulnerability, the initiative allowed the company to discover more than 270 vulnerabilities in its solutions.
Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer.
Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US.
Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines.
Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.