First published: Fri Oct 09 2020(Updated: )
Certain NETGEAR devices are affected by lack of access control at the function level. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D6200 Firmware | <1.1.00.38 | |
Netgear D6200 | ||
Netgear D7000 Firmware | <1.0.1.78 | |
NETGEAR D7000 | ||
Netgear Jr6150 Firmware | <1.0.1.24 | |
Netgear Jr6150 | ||
Netgear R6020 Firmware | <1.0.0.42 | |
NETGEAR R6020 | ||
Netgear R6050 Firmware | <1.0.1.24 | |
Netgear R6050 | ||
Netgear R6080 Firmware | <1.0.0.42 | |
Netgear R6080 | ||
Netgear R6120 Firmware | <1.0.0.66 | |
NETGEAR R6120 | ||
Netgear R6220 Firmware | <1.1.0.100 | |
NETGEAR R6220 | ||
Netgear R6260 Firmware | <1.1.0.64 | |
NETGEAR R6260 | ||
Netgear R6700v2 Firmware | <1.2.0.62 | |
NETGEAR R6700v2 | ||
Netgear R6800 Firmware | <1.2.0.62 | |
Netgear R6800 | ||
Netgear R6900v2 Firmware | <1.2.0.62 | |
Netgear R6900v2 | ||
Netgear R7450 Firmware | <1.2.0.62 | |
NETGEAR R7450 | ||
Netgear Wnr2020 Firmware | <1.1.0.62 | |
Netgear Wnr2020 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
D6200, D7000, JR6150, R6020, R6050, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, and Wnr2020 are affected by CVE-2020-26911.
The severity of CVE-2020-26911 is high with a CVSS score of 8.8.
CVE-2020-26911 affects NETGEAR devices by allowing unauthorized access at the function level, potentially leading to unauthorized actions and data leakage.
Check the firmware version of your NETGEAR device against the affected versions mentioned in the advisory.
You can find more information about CVE-2020-26911 in the Netgear security advisory at the provided reference link.