CWE
120 119
Advisory Published
Updated

CVE-2020-35224: Buffer Overflow

First published: Wed Mar 10 2021(Updated: )

A buffer overflow vulnerability in the NSDP protocol authentication method on NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices allows remote unauthenticated attackers to force a device reboot.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Netgear Gs116e Firmware=2.6.0.43
Netgear Gs116e=v2
Netgear Jgs516pe Firmware=2.6.0.43
NETGEAR JGS516PE

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this NETGEAR JGS516PE/GS116Ev2 vulnerability?

    The vulnerability ID is CVE-2020-35224.

  • What is the severity level of CVE-2020-35224?

    CVE-2020-35224 has a severity level of 6.5 (medium).

  • How can remote attackers exploit CVE-2020-35224?

    Remote unauthenticated attackers can exploit CVE-2020-35224 by forcing a device reboot through a buffer overflow vulnerability in the NSDP protocol authentication method.

  • Which NETGEAR devices are affected by CVE-2020-35224?

    NETGEAR JGS516PE/GS116Ev2 v2.6.0.43 devices are affected by CVE-2020-35224.

  • Is the NETGEAR GS116E or JGS516PE vulnerable to CVE-2020-35224?

    No, the NETGEAR GS116E and JGS516PE are not vulnerable to CVE-2020-35224.

  • How can I fix the CVE-2020-35224 vulnerability?

    To fix the CVE-2020-35224 vulnerability, it is recommended to update the firmware of the affected NETGEAR JGS516PE/GS116Ev2 devices to a version that addresses the issue.

  • Where can I find more information about CVE-2020-35224?

    You can find more information about CVE-2020-35224 at the following reference: [Link](https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/)

  • What are the common weaknesses associated with CVE-2020-35224?

    CVE-2020-35224 is associated with the common weaknesses CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-120 (Buffer Copy without Checking Size of Input).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203