Netgear D6000 and D3600 contain hard-coded cryptographic keys and are vulnerable to authentication bypass
Vulnerability Note VU#778696
Original Release Date: 2016-06-10 | Last Revised: 2016-07-01
The Netgear D6000 and D3600 routers are vulnerable to authentication bypass and contain hard-coded cryptographic keys embedded in their firmware.
CWE-321: Use of Hard-coded Cryptographic Key -- CVE-2015-8288
The firmware for these devices contains a hard-coded RSA private key, as well as a hard-coded X.509 certificate and key. An attacker with knowledge of these keys could gain administrator access to the device, implement man-in-the-middle attacks, or decrypt passively captured packets.
CWE-288: Authentication Bypass Using an Alternate Path or Channel -- CVE-2015-8289
A remote attacker able to access the /cgi-bin/passrec.asp password recovery page may be able to view the administrator password in clear text by opening the source code of above page.
According to the reporter, these vulnerabilities affect firmware versions 188.8.131.52 and 184.108.40.206 running on Netgear model D6000 and D3600. Other models and firmware versions may also be impacted.
A remote unauthenticated attacker may be able to gain administrator access to the device, man-in-the-middle a victim on the network, or decrypt passively captured data.
Apply an update
Netgear has released firmware version 220.127.116.11 on April 20th, 2016 to address these issues. Affected users are encouraged to update the device's firmware as soon as possible. Netgear has also created Knowledgebase articles about these issues; please see the URLs in the References section below.
Affected users might also consider the following workarounds:
Restrict network access
Restrict network access to the Netgear device's system web interface and other devices using open protocols like HTTP. Consult your firewall product's manual for more information.