First published: Mon Jun 20 2016(Updated: )
The password-recovery feature on NETGEAR D3600 devices with firmware 1.0.0.49 and D6000 devices with firmware 1.0.0.49 and earlier allows remote attackers to discover the cleartext administrator password by reading the cgi-bin/passrec.asp HTML source code.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR D3600 firmware | =1.0.0.49 | |
NETGEAR D3600 firmware | ||
NETGEAR D6000 firmware | <=1.0.0.49 | |
NETGEAR D6000 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8289 is classified as a high severity vulnerability due to the risk of exposing administrator passwords to remote attackers.
To fix CVE-2015-8289, you should upgrade to the latest firmware version of the NETGEAR D3600 and D6000 devices.
CVE-2015-8289 affects NETGEAR D3600 devices with firmware 1.0.0.49 and D6000 devices with firmware 1.0.0.49 and earlier.
CVE-2015-8289 allows remote attackers to uncover the cleartext administrator password through the password-recovery feature.
If your device firmware has been updated to a version later than 1.0.0.49, then CVE-2015-8289 should no longer pose a threat.