Description Preview
Overview
This vulnerability is a stored Cross-Site Scripting (XSS) issue affecting multiple NETGEAR router models. Stored XSS occurs when malicious scripts are injected into a website and permanently stored on the target server, such as in a database, message forum, comment field, or other storage locations. When other users browse to the affected page, the malicious script executes in their browsers in the context of their session.
The vulnerability could allow attackers to:
- Steal session cookies and impersonate users
- Capture credentials or other sensitive information
- Perform actions on behalf of the victim
- Modify the appearance of the web interface
- Redirect users to malicious websites
Affected devices include popular NETGEAR router models used in both home and small business environments.
Remediation
NETGEAR has released firmware updates that address this vulnerability. Users of affected devices should update to the following firmware versions or later:
- D7800: Update to version 1.0.1.56 or later
- R7500v2: Update to version 1.0.3.46 or later
- R7800: Update to version 1.0.2.74 or later
- R8900: Update to version 1.0.4.28 or later
- R9000: Update to version 1.0.4.28 or later
- XR500: Update to version 2.3.2.56 or later
- XR700: Update to version 1.0.1.10 or later
- RAX120: Update to version 1.0.0.78 or later
To update your router's firmware:
- Access your router's web interface by entering its IP address in a browser
- Log in with your administrator credentials
- Navigate to the firmware or administration section
- Check for and install the latest firmware update
- Restart your router after the update is complete
Additional security recommendations:
- Change default administrator credentials
- Disable remote administration if not needed
- Implement strong, unique passwords
- Keep the router firmware regularly updated
References
- NETGEAR Security Advisory: https://kb.netgear.com/000062662/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2018-0490
- Common Weakness Enumeration: CWE-79 (Cross-site Scripting)
- MITRE CVE Entry: CVE-2020-35836
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade