Saturday, March 25, 2023
AI Home Security
No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
No Result
View All Result
Morning News
No Result
View All Result
Home Cyber Security

Critical Security Vulnerabilities Discovered in Netcomm and TP-Link Routers

justmattg by justmattg
January 22, 2023
in Cyber Security
0
Critical Security Vulnerabilities Discovered in Netcomm and TP-Link Routers
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

READ ALSO

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

Red Teaming at Scale to Uncover Your Big Unknowns


Jan 18, 2023Ravie LakshmananNetwork Security

Netcomm and TP-Link Routers

Security vulnerabilities have been disclosed in Netcomm and TP-Link routers, some of which could be weaponized to achieve remote code execution.

The flaws, tracked as CVE-2022-4873 and CVE-2022-4874, concern a case of stack-based buffer overflow and authentication bypass and impact Netcomm router models NF20MESH, NF20, and NL1902 running firmware versions earlier than R6B035.

“The two vulnerabilities, when chained together, permit a remote, unauthenticated attacker to execute arbitrary code,” the CERT Coordination Center (CERT/CC) said in an advisory published Tuesday.

“The attacker can first gain unauthorized access to affected devices, and then use those entry points to gain access to other networks or compromise the availability, integrity, or confidentiality of data being transmitted from the internal network.”

Security researcher Brendan Scarvell has been credited with discovering and reporting the issues in October 2022.

Vulnerabilities in Netcomm and TP-Link Routers

In a related development, CERT/CC also detailed two unpatched security vulnerabilities affecting TP-Link routers WR710N-V1-151022 and Archer-C5-V2-160201 that could lead to information disclosure (CVE-2022-4499) and remote code execution (CVE-2022-4498).

CVE-2022-4499 is also a side-channel attack targeting a function used to validate the entered credentials. “By measuring the response time of the vulnerable process, each byte of the username and password strings may be easier to guess,” CERT/CC said.

Microsoft researcher James Hull has been acknowledged for disclosing the two bugs. The Hacker News has reached out to TP-Link for a comment, and we will update the story if we hear back.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Related Posts

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
Cyber Security

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

March 25, 2023
Red Teaming at Scale to Uncover Your Big Unknowns
Cyber Security

Red Teaming at Scale to Uncover Your Big Unknowns

March 24, 2023
Inside the High Risk of 3rd-Party SaaS Apps
Cyber Security

Inside the High Risk of 3rd-Party SaaS Apps

March 24, 2023
Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams
Cyber Security

Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams

March 24, 2023
Fake ChatGPT Chrome Browser Extension Caught Hijacking Facebook Accounts
Cyber Security

Fake ChatGPT Chrome Browser Extension Caught Hijacking Facebook Accounts

March 24, 2023
2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks
Cyber Security

2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks

March 23, 2023
Next Post
Git Users Urged to Update Software to Prevent Remote Code Execution Attacks

Git Users Urged to Update Software to Prevent Remote Code Execution Attacks

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

February 13, 2023
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

February 11, 2023
The New Threats to Cryptocurrency Users

The New Threats to Cryptocurrency Users

February 12, 2023
Do you know who is watching you?

Do you know who is watching you?

January 2, 2023
PopID announces big customer deployment for face biometric payments in UAE

PopID announces big customer deployment for face biometric payments in UAE

February 14, 2023

EDITOR'S PICK

Hollon Reserve Gun Safes – Protecting Your Firearms

Hollon Reserve Gun Safes – Protecting Your Firearms

January 5, 2023
Synology Releases Patch for Critical RCE Vulnerability Affecting VPN Plus Servers

Synology Releases Patch for Critical RCE Vulnerability Affecting VPN Plus Servers

January 9, 2023
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only

Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only

February 18, 2023
Thousands of Citrix Servers Still Unpatched for Critical Vulnerabilities

Thousands of Citrix Servers Still Unpatched for Critical Vulnerabilities

January 1, 2023

About

We bring you the best news & updates related to Home security, Cyber security and Biometric technology. Keep visiting our website for latest updates.

Follow us

Categories

  • Biometric Technology
  • Cyber Security
  • Home Security

Recent Posts

  • Another Big BIPA Ruling, Paris Olympics Legislation, NEOM Airlines, and More: Identity News Digest
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • The NSA and CISA Highlight On-device Privacy: Identity News Digest
  • Red Teaming at Scale to Uncover Your Big Unknowns
  • Privacy Policy
  • Contact Us

© 2023 AI Home Security - All rights reserved.

No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology

© 2023 AI Home Security - All rights reserved.