First published: Tue Dec 29 2020(Updated: )
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects JGS516PE before 2.6.0.48, JGS524Ev2 before 2.6.0.48, JGS524PE before 2.6.0.48, and GS116Ev2 before 2.6.0.48. A TFTP server was found to be active by default. It allows remote authenticated users to update the switch firmware.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Jgs516pe Firmware | <2.6.0.48 | |
NETGEAR JGS516PE | ||
Netgear Jgs524e Firmware | <2.6.0.48 | |
Netgear Jgs524e | =v2 | |
Netgear Jgs524pe Firmware | <2.6.0.48 | |
Netgear Jgs524pe | ||
Netgear Gs116e Firmware | <2.6.0.48 | |
Netgear Gs116e | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35801 is classified as a high severity vulnerability due to its potential to allow unauthorized remote access.
To fix CVE-2020-35801, update the firmware of the affected NETGEAR devices to version 2.6.0.48 or later.
CVE-2020-35801 affects NETGEAR JGS516PE, JGS524Ev2, JGS524PE, and GS116Ev2 devices running firmware versions prior to 2.6.0.48.
CVE-2020-35801 involves incorrect configuration of security settings, allowing a TFTP server to be active by default.
Yes, CVE-2020-35801 allows remote authenticated users to exploit the vulnerability if the affected configurations are present.