Critical Vulnerability Across 18+ Network Switch Vendors: Cisco, Netgear, More

Published Aug 26, 2019 14:36 PM

Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered by prolific researcher bashis.

Most importantly, it shows supply chain risks with so many sharing the same fundamental software/hardware.

Inside, we report details on:

  • Vulnerability overview
  • Realtek response
  • Which manufacturers are affected
  • Why so many companies are vulnerable
  • Impact on the security industry
  • Supply chain risks

Those interested in cybersecurity within our industry should see our Cybersecurity Vulnerability Directory.

Executive *******

Realtek Switch Controller

******* ************* *** *** *** **** central ********* - ***************** ****** ********** *******. **** ******** core ******** **** **** ****** *** which **** ** *** ******* ****** were **** ** ****** **** *************.

*********************

***** ****** **** *** ******** ******* SDK ****** ** ***** ********.

***** *** ******* *************** ** *** SDK ********* ***** ********* ***** *********** remote **** *********, *** ** *** proof ** *******, ****** ** **** to *** *** ****** ***** ***** access ** ***********.

No *** **** *******

**** **** ***********, ** * ******, Realtek ******* ** ******** *** *** for ****, ********* ******'* ******:

*************, ** ** ***, ***** *** initial ******** ** ***** ****, ** weren’t **** ** ******* *** ********* response **** ******* ********* ***** ******.

Manufacturers ********

******** ** ************ *** ********* ****** *************:

Switch Manufacturers Affected by Vulnerable SDK

**** * ******** ** **** ************'* products *** ******** ***** ** ** based ** *** *** ** *** specific ******* ****. *** *******, *********, **** *** *** ******, **** ***** ***** ******** ****, is **********. ** ********, *** ***** 300 ****** ******** **** ** *** nor *** *****'* ********** ********.

*** ************* ** *** ******* ** the ****** ************* *****. ****** **** us **** *** ************* *** **** proven ** ** ******* *** ***** are ***** ******* ** ***********, ** well ** ****** **** **** ***** are **** ***** *** ***, *** not *** **********.

Surveillance ******** ********

*********** ******* ************ ***** *** ** *** ******** companies, ***** *** *******, *** *** choices *** ***** ************ ******* ********.

Updated ****** ********

********* **** ******** ********* ****** ****** firmware, ** ** ** *********. *****, Netgear, *** ***** ************* **** ******* firmware ****** *** *************. ***** *** links ** *** ******* ******** *** the *** ******* *************:

***** *** **** ********:*****-**,*****-***,*****-**,*****-***,*****-**,*****-***,*****-**,*****-****,*****-**,*****-***,**-***-**

******* ****** ********:****** ******* **** ******,*********,**********,*********,********,*********,**********,*********,********

Supply ***** *****

**** **** ****** *** ********* ***** were ** ***** * ***** ************* without ******* ********, ********* ** ****.

*** **** ** *** ************* ******* a *********** ****, *** **** **** it *** ** ****** *********** *** so **** ** *** *** ******* brands ** *** **, *********** *** challenges *** ******* ** ********* ******** devices ** *** ***** **** ******* in **** ******** **********.

Comments (12)
U
Undisclosed #1
Aug 26, 2019

** ***** * *** ******* *** this?

* ****** ** ***** ******* *** access ** ******* *** ** *** vulnerabilities, ************ ***** ******** *** ******* not ***** *** ****** ********** ************.

(1)
bm
bashis mcw
Aug 26, 2019

************* * *** ***** **** **** 30k ********** ******* ** *** ******** as ** *****...

***** ******* *.* ** *** **** critical

***** ***** ******** *** ****** ***** Switches ****** **** ********* ***************

*.* *** *** ******

***** ***** ******** *** ****** ***** Switches ************** ****** *************

*** *.* *** *** *****

***** ***** ******** *** ****** ***** Switches ******* ********* *************

(5)
(1)
BP
Bas Poiesz
Aug 27, 2019

**** ***** ******* ** ****** *************** it ***** *** ** *** ***** items **** ********** ********, ** **** it's *** *******.

(1)
U
Undisclosed #1
Aug 27, 2019

** **** **'* *** *******

*** **** ** **** *** ******* more **********. *** *************** *** ****** back ** * ******* **** *** SDK. ******* ** * ******* *******.

(1)
(1)
BP
Bas Poiesz
Aug 27, 2019

* **** *** ******* ***********. ** point *** **** ****** ** ***** to ** ***** *** ***, ***** other *******, * ******** ******** ******.

**'* ****** ** ** **** * large ****** **** ***** *** ** many ****** *************** *** ** *** a ******** ******** ******.

JH
John Honovich
Aug 27, 2019
IPVM

******* ** * ******* *******

******* ** **** ******, *** ***, *** *****, *** PRC.

(1)
(2)
BP
Bas Poiesz
Aug 27, 2019

* ***** *********. *** *** *****, it's *** ***.

*****, **** **** **** *************** ** deserves **** ******* ******** ***'* *** think?It's * ******* **** *** ******** brand, **** ** ****.

** **** ** ***** * ** company **** ** ****?

(1)
U
Undisclosed #1
Aug 27, 2019

******* ** ************* ** ******, *** their ******* ***** *** ******* ******** all **** ** ********* **** * China ********.

(1)
JS
Jonathan Strauss
Aug 27, 2019

**** ** ***** *************** **** **** they *** ****** *** *** *** UI ***** ****** ** ******** ** begin ****.

U
Undisclosed #3
Aug 26, 2019
IPVMU Certified

* ****** ** ***** ******* *** access ** ******* *** ** *** vulnerabilities, ************ ***** ******** *** ******* not ***** *** ****** ********** ************.

**** ***** **** **** ** ***** also, ***...

**** ************* ******* ***** ***** ******** 220 ****** ***** ******** ******* ******** versions ***** ** *.*.*.* **** *** web ********** ********* *******.The *** ********** ********* ** ******* *** **** **** *** ***** ** *******.

UM
Undisclosed Manufacturer #2
Aug 26, 2019

*** ********:

*. *********** **** *** ****** ******* category ** *****. ** ***** * few ****** **** **** ** **** number?

*. *** ****** ******* ***** *******:*****://***.********.***/**/*********/.**'* **** ******* *** **** * decade **** *** *** ******** (** Cisco **** ** *******) **** **** coming **** **** **** **** ** malware. ***** *** *** ** *** original ******** ** ********.

(1)
U
Undisclosed #4
Aug 27, 2019

(1)
(2)