Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vulnerabilities could leave thousands of Netgear routers exposed - Synopsys expert comments

January 2017 by Mike Ahmadi, Global Director – Critical Systems Security at Synopsys

This afternoon, Trustwave released findings on new vulnerabilities discovered in 31
models of Netgear routers, adding up to a minimum of 10,000 vulnerable devices, but
could be as much as possibly over a million.

These new vulnerabilities allow an attacker to discover, or completely bypass, any
password on a Netgear router, giving them complete control of the router, including
the ability to change configuration, turn infected routers into botnets or even
upload entirely new firmware. This comes on the heels of the December Netgear
vulnerabilities, which were “Command Injection” based, showing the increasing
severity of the issue in use of these routers.

Commenting on this, Mike Ahmadi, Global Director – Critical Systems Security at
Synopsys, said "We have tested many routers and firewalls over the last decade, and
have found vulnerabilities numbering in the thousands, using both fuzz testing and
software composition analyses. Vendors typically build such devices for the stated
functionality, which is to route traffic and block unwanted traffic, when used as
intended.

"What many vendors fail to do, however, is adequately assess the inherent security
of the devices they sell, thereby flooding the market with vulnerable devices. Some
vendors have taken it upon themselves to address the inherent vulnerabilities, but
the end user is often left guessing which devices are adequately tested, since there
is currently no regulatory requirement to test to a given level of rigor, and any
attempt to force such regulations are met with extreme resistance.

"The only way a consumer can determine the level of risk associated with a device is
to run their own tests and determine what vulnerabilities are present, and use this
information in procurement to force a vendor to fix the issues, or move on to
another vendor that is doing a better job addressing such issues, or require a third
party security audit, such as the UL CAP program."


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts