It has been discovered recently by the European security and compliance assessment company Onekey that arbitrary code may be injected into multiple Netgear router models through FunJSQ in a malicious manner.
In order to accelerate online games, Xiamen Xunwang Network Technology has developed a third-party module known as FunJSQ. In short, FunJSQ is a third-party gaming module.
Along with routers there are some Orbi WiFi Systems that are also affected. If your WiFi password is known to an attacker or your router’s Ethernet cable is connected to your computer, then this vulnerability is exploitable.
Affected Routers and WiFi Systems
Here below we have mentioned the all the router models and WiFi systems that are affected. Not only that even we have also mention their respective fixed firmware versions as well:-
- R6230 fixed in firmware version 22.214.171.124
- R6260 fixed in firmware version 126.96.36.199
- R7000 fixed in firmware version 188.8.131.52
- R8900 fixed in firmware version 184.108.40.206
- R9000 fixed in firmware version 220.127.116.11
- RAX120 fixed in firmware version 18.104.22.168
- RAX120v2 fixed in firmware version 22.214.171.124
- XR300 fixed in firmware version 126.96.36.199
Orbi WiFi Systems
- RBR20 fixed in firmware version 188.8.131.52
- RBR50 fixed in firmware version 184.108.40.206
- RBS20 fixed in firmware version 220.127.116.11
- RBS50 fixed in firmware version 18.104.22.168
A first set of patches was issued by Netgear for the vulnerable devices this month after they were informed of the security holes in June.
The FunJSQ gaming module does not have a secure update process. Update packages that are sent from the server to the FunJSQ module are only superficially checked.
A hash checksum is used to validate the packages on the device as they are unsigned.
There are a number of actions that an attacker can take in order to exploit an insecure communication channel, such as:-
- The data that has been returned from the server can be tampered with.
- A package can be extracted with elevated privileges from its contents and placed in the root folder.
- It is possible to overwrite anything on the device by taking control of the update package.
There is a potential for arbitrary code to be executed from the WAN interface as a result of these factors combined.
CVE-2022-40620 has been assigned to the issue relating to an insecure update mechanism introduced in the release. CVE-2022-40619 was the CVE ID number assigned to the flaw related to unauthenticated command injections.
Download the Latest Firmware
- To begin with, you will need to visit the NETGEAR Support page.
- In the search box, you will need to enter your model number.
- Once the drop-down menu appears, you can select the model you are looking for from it.
- After that, click on the Downloads tab.
- If the title of your first download starts with the firmware version under Current Versions, then pick that one.
- The next thing you need to do is click the Release Notes button.
- For instructions on downloading and installing the new firmware, please refer to the firmware release notes.
It should be noted that Netgear has not yet divulged a workaround for this vulnerability. The latest firmware from NETGEAR should be downloaded as soon as possible, as NETGEAR strongly recommends you do so.
Download Free SWG – Secure Web Filtering – E-book