Associated CVE IDs: None
NETGEAR is aware of a Transport Layer Security (TLS) certificate private key disclosure vulnerability on the following product models:
These products use Certificate Authority-signed certificates to provide secure HTTPS access to the router web interface. You might see a security certificate error or warning when you try to access your router’s web interface using HTTPS.
NETGEAR has released firmware hotfixes for the following affected product models:
Security hotfixes are beta firmware created outside of normal development and testing processes. While the hotfixes do fix the security vulnerabilities identified above, they could negatively affect the regular operation of your device. Though our pre-deployment testing process did not indicate that these hotfixes would impact device operability, we always encourage our users to monitor their device closely after installing the firmware hotfix.
NETGEAR strongly recommends that you download the latest firmware hotfixes for these product models as soon as possible.
To download the latest firmware for your NETGEAR product:
- Visit NETGEAR Support.
- Start typing your model number in the search box, then select your model from the drop-down menu as soon as it appears.
If you do not see a drop-down menu, make sure that you entered your model number correctly, or select a product category to browse for your product model.
- Click Downloads.
- Under Current Versions, select the download whose title begins with Firmware Version.
- Click Release Notes.
- Follow the instructions in the firmware release notes to download and install the new firmware.
Your web browser might display a security warning when you log in to your router after installing the new firmware hotfix. This is a standard warning that your browser displays when it detects a self-signed security certificate. For more information, see I get a security warning in my browser when I try to log in to my NETGEAR or Orbi router; what do I do?.
NETGEAR plans to release firmware hotfixes for the remaining affected products as soon as possible.
Until a firmware fix is available for your product, NETGEAR recommends that you follow the procedures in the Workarounds section of this advisory.
NETGEAR will update this advisory when more information becomes available.
Workarounds
Until a firmware fix is available for your product, NETGEAR recommends that you follow one of these workarounds:
Disclaimer
This document is provided on an "as is" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. NETGEAR reserves the right to change or update this document at any time. As necessary, NETGEAR will update this document as new information becomes available.
The TLS certificate private key disclosure vulnerability remains if you do not complete all recommended steps. NETGEAR is not responsible for any consequences that could have been avoided by following the recommendations in this notification.
Acknowledgements
None
Common Vulnerability Scoring System Vector
CVSS v3 Rating: High
CVSS v3 Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Contact
We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.
It is NETGEAR's mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.
To report a security vulnerability, visit https://bugcrowd.com/netgear.
If you are a NETGEAR customer with a security-related support concern, you can contact NETGEAR customer support at techsupport.security@netgear.com.
For all other issues, visit http://www.netgear.com/about/security/.
Revision History
2020-01-20: Published advisory
2020-01-24:
- Added hotfixes for R8900 and R9000
- Added explanation of security hotfixes
- Added firmware download instructions
- Added note about security warnings related to self-signed certificates
- Clarified wording of the Workarounds section
- Added disclaimer about following NETGEAR’s recommendations
2020-02-19: Added hotfix for XR700
Last Updated:05/04/2022
|
Article ID: 000061582