Threat Watch

Microsoft Finds NETGEAR Router Bugs

Attackers could use critical firmware vulnerabilities discovered by Microsoft in some NETGEAR router models as a steppingstone to move laterally within enterprise networks. The security flaws impact DGN2200v1 series routers running firmware versions before v1.0.0.60 and compatible with all major DSL Internet service providers. They allow unauthenticated attackers to access unpatched routers’ management pages via authentication bypass, gain access to secrets stored on the device, and derive saved router credentials using a cryptographic side-channel attack. The three bugs “can compromise a network’s security—opening the gates for attackers to roam untethered through an entire organization,” Microsoft 365 Defender Research Team’s Jonathan Bar Or explains. The security issues were discovered by Microsoft’s researchers while reviewing Microsoft Defender for Endpoint’s new device discovery fingerprinting capabilities after noticing that a DGN2200v1 router’s management port was being accessed by another device on the network. “The communication was flagged as anomalous by machine learning models, but the communication itself was TLS-encrypted and private to protect customer privacy, so we decided to focus on the router and investigate whether it exhibited security weaknesses that can be exploited in a possible attack scenario,” the researcher added. “In our research, we unpacked the router firmware and found three vulnerabilities that can be reliably exploited.”


NETGEAR has fixed the vulnerabilities with a patch. To download and apply the patch, simply visit the NETGEAR support website and follow their instructions. IT administrators should actively search for new security patches to keep their devices/software as safe as possible.