|24 Apr 2014||#1|
| || |
Netgear Patch Said to Leave Backdoor Problem in Router
The security researcher who identified an admin backdoor in a range of routers last year has found that Netgear's patches don't adequately address the security issue.
In December, Eloi Vanderbeken discovered that he could get a remote root shell on his Linksys WAG200G router without authenticating when connecting to the device over TCP port 32764. The same backdoor feature was later confirmed in 24 router models sold under the Netgear, Cisco Systems, Linksys (now owned by Belkin) and Diamond brands and it was believed to have its origins in firmware code developed by Sercomm, a Taiwan-based manufacturer of wireless and broadband equipment that serves as hardware partner for multiple networking vendors.
Vanderbeken, a researcher at Paris-based IT security firm Synacktiv, recently downloaded and analyzed a firmware update released by Netgear for its DGN1000 Wireless router and DSL modem that was supposed to have fixed the issue. He found that the backdoor is no longer directly accessible over port 32764 TCP, but that it can be reactivated by sending raw Ethernet packets to the device with protocol type 0x8888 and the MD5 signature of the router model (DGN1000) as the payload.
"The 0x8888 ethertype and packet structure is used in an old Sercomm update tool," the researcher said in a report of his findings.
|My System Specs|
|Similar help and support threads for2: Netgear Patch Said to Leave Backdoor Problem in Router|
|Backdoor in wireless DSL routers lets attacker reset router, get admin||Security News|
|D-Link Router backdoor vulnerability discovered||Security News|
|Netgear N600 router & Netgear WN3000 range extender||Network & Sharing|
|problem with netgear router||Network & Sharing|
|Netgear Router Help||Network & Sharing|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 06:00 PM.