Recently, Netgear has published security updates to inscribe 15 severe vulnerabilities in its JGS516PE Ethernet switch. These flaws involve an unauthenticated remote code execution vulnerability which is considered as one of the critical flaws.
According to the cybersecurity analyst , this switch is unprotected to nine high-severity vulnerabilities, and among them, there are five medium-rated ones.
However, this switch flaw is affecting firmware versions that are prior to 2.6.0.43. And the researchers pronounced that the bug is associated with the internal administration of web applications.
The switch flaw is not performing accurate access controls which could enable the threat actors to circumvent authentication and run code with the rights of the controller.
There is a total of two vulnerable software, and here we have mentioned them below:-
Apart from this, any non-authenticated attacker can easily exploit these vulnerabilities remotely through the local area network (LAN). While to exploit the flaw what attackers have to do is send a specially crafted request to the affected system, that’s it.
Moreover, the cybersecurity experts affirmed that they have not yet detected any known malware exploiting this flaw. But, Netgear has acknowledged that they are trying their best to identify all the vulnerabilities and find the mitigations of these vulnerabilities.
Also Read
Google Fixed yet Another Actively Exploited zero-day Vulnerability in the Chrome Browser
New Crypto-Miner Campaign Targets QNAP NAS Devices via the Unauthorized RCE Vulnerability
legit dumps with pin seller cheap dumps cvv