First published: Thu Dec 19 2013(Updated: )
NETGEAR ProSafe GS724Tv3 and GS716Tv2 with firmware 5.4.1.13 and earlier; GS748Tv4 with firmware 5.4.1.14; GS510TP with firmware 5.4.0.6; GS752TPS, GS728TPS, GS728TS, and GS725TS with firmware 5.3.0.17; and GS752TXS and GS728TXS with firmware 6.1.0.12 allows remote attackers to read encrypted administrator credentials and other startup configurations via a direct request to filesystem/startup-config.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Prosafe Firmware | =5.3.0.17 | |
Netgear Prosafe Gs725ts | ||
Netgear Prosafe Gs728tps | ||
Netgear Prosafe Gs728ts | ||
Netgear Prosafe Gs752tps | ||
Netgear Prosafe Firmware | <=5.4.1.13 | |
Netgear Prosafe Firmware | =5.0.4.4 | |
Netgear Prosafe Firmware | =5.4.0.6 | |
Netgear Prosafe Firmware | =5.4.1.10 | |
NETGEAR ProSafe GS724T | =v3 | |
Netgear Prosafe S716t | =v2 | |
Netgear Prosafe Firmware | =6.1.0.12 | |
Netgear Prosafe Gs728txs | ||
Netgear Prosafe Gs752txs | ||
Netgear Prosafe Firmware | <=5.4.1.14 | |
Netgear Prosafe Firmware | =5.4.1.13 | |
Netgear Prosafe Gs748t | =v4 | |
Netgear Prosafe Gs510tp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.