First published: Wed Aug 31 2016(Updated: )
cgi-bin/cgi_system in NUUO NVRmini 2 1.7.5 through 2.x, NUUO NVRsolo 1.7.5 through 2.x, and NETGEAR ReadyNAS Surveillance 1.1.1 through 1.4.1 allows remote attackers to reset the administrator password via a cmd=loaddefconfig action.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR ReadyNAS Surveillance | =1.1.1 | |
NETGEAR ReadyNAS Surveillance | =1.1.2 | |
NETGEAR ReadyNAS Surveillance | =1.2.0.4 | |
NETGEAR ReadyNAS Surveillance | =1.3.2.4 | |
NETGEAR ReadyNAS Surveillance | =1.3.2.14 | |
NETGEAR ReadyNAS Surveillance | =1.4.0 | |
NETGEAR ReadyNAS Surveillance | =1.4.1 | |
NETGEAR ReadyNAS Surveillance | =1.4.2 | |
NUUO NVRsolo | =1.75 | |
NUUO NVRsolo | =2.0.0 | |
NUUO NVRsolo | =2.0.1 | |
NUUO NVRsolo | =2.1.5 | |
NUUO NVRsolo | =2.2.2 | |
NUUO NVRsolo | =2.3 | |
NUUO NVRsolo | =2.3.1.20 | |
NUUO NVRsolo | =2.3.7.9 | |
NUUO NVRsolo | =2.3.7.10 | |
NUUO NVRsolo | =2.3.9.6 | |
NUUO NVRsolo | =3.0.0 | |
NUUO NVRmini 2 | =1.7.5 | |
NUUO NVRmini 2 | =1.7.6 | |
NUUO NVRmini 2 | =2.0.0 | |
NUUO NVRmini 2 | =2.2.1 | |
NUUO NVRmini 2 | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5676 is considered a medium severity vulnerability due to its potential impact on security by allowing unauthorized password resets.
To fix CVE-2016-5676, users should upgrade to the latest version of the affected software that addresses this vulnerability.
CVE-2016-5676 affects NUUO NVRmini 2 versions 1.7.5 through 2.x, NUUO NVRsolo versions 1.7.5 through 2.x, and NETGEAR ReadyNAS Surveillance versions 1.1.1 through 1.4.1.
Yes, CVE-2016-5676 can be exploited remotely by attackers to reset administrator passwords.
If you use software affected by CVE-2016-5676, you should assess your exposure and implement necessary updates or mitigations immediately.