First published: Wed Jan 04 2017(Updated: )
NETGEAR Arlo base stations with firmware 1.7.5_6178 and earlier, Arlo Q devices with firmware 1.8.0_5551 and earlier, and Arlo Q Plus devices with firmware 1.8.1_6094 and earlier have a default password of 12345678, which makes it easier for remote attackers to obtain access after a factory reset or in a factory configuration.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Arlo Base Station Firmware | <=1.7.5_6178 | |
Netgear VMB30X0 | ||
Netgear Vmk3xx0 | ||
Netgear Vms3xx0 | ||
Netgear Arlo Q Camera Firmware | <=1.8.0_5551 | |
Netgear VMC3040 | ||
Arlo Q Plus Firmware | <=1.8.1_6094 | |
Netgear VMC3040 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The affected devices include NETGEAR Arlo base stations with firmware 1.7.5_6178 and earlier, Arlo Q devices with firmware 1.8.0_5551 and earlier, and Arlo Q Plus devices with firmware 1.8.1_6094 and earlier.
CVE-2016-10115 is considered a high-severity vulnerability due to the use of default credentials.
To fix CVE-2016-10115, change the default password from '12345678' to a strong, unique password after a factory reset.
CVE-2016-10115 poses a risk of unauthorized access to the device, allowing remote attackers to control the device.
Yes, updating the firmware of the affected NETGEAR devices to the latest version addresses the vulnerability.