Headline
CVE-2022-24372: Linksys Dual-Band Mesh-WLAN WiFi 6 Router (MR9600)
Linksys MR9600 devices before 2.0.5 allow attackers to read arbitrary files via a symbolic link to the root directory of a NAS SMB share.
Merkmale
Die Zukunft beginnt mit der Intelligent Mesh™-Technologie und WiFi 6 jetzt schon.
Der Linksys MR9600 ist ein extrem leistungsstarker Dual-Band WiFi 6 Router – perfekt für all diejenigen, die sich echte Gigabit-Geschwindigkeiten, eine höhere Reichweite und überall zu Hause genug Power zum Gamen wünschen. Mit Linksys Intelligent Mesh™-Technologie und Datenübertragungsraten von 6 Gbit/s ist er 4x schneller als WiFi 5 Router, verhindert Funklöcher und isoliert Ihr Netzwerk, um Störungen zu vermeiden. Mit diesem zukunftssicheren Router können Sie Ihr Netzwerk bei Bedarf erweitern, indem Sie Produkte hinzufügen, die mit dem Mesh-System von Linksys kompatibel sind. Mit der Linksys App lässt sich der MR9600 mühelos einrichten, sodass Sie in wenigen Minuten 8K-Videos streamen können.
Mehr Kapazität für mehr Geräte
WiFi 6 sendet und empfängt mehrere Datenströme gleichzeitig und sorgt für eine 4-mal höhere WLAN-Kapazität, um jedem Mobil-, Streaming-, Gaming- und Smart-Home-Gerät in Ihrem Netzwerk gerecht zu werden.
Keine Funklöcher mehr
Intelligent Mesh™-Technologie sorgt in Kombination mit WiFi 6 überall bei Ihnen Zuhause für WLAN-Geschwindigkeiten im Gigabit-Bereich – auch im Garten und auf Smart-Home-Geräten im Außenbereich.
EINFACHE EINRICHTUNG UND BEDIENUNG
Über die Linksys App erfolgt das Setup im Nu und Sie können von überall aus einfach auf Ihr Netzwerk zugreifen. Es ist zudem möglich, einzustellen, welche verbundenen Geräte die höchste Bandbreite im WLAN erhalten.
Verringert WLAN-Überlastung
Verhindert mithilfe der technisch ausgereiften WiFi 6-Technologie, die Ihr Netzwerk isolieren, Überlastung reduzieren und für das stärkste, klarste WLAN-Signal sorgen kann, Störungen durch benachbarte Netzwerke.
Smartere Sicherheitsfunktionen
Ihr Netzwerk ist dank der automatischen Software-Updates, Kinderschutzfunktionen und separatem Gastzugriff immer sicher und auf dem neuesten Stand.
100 % abwärtskompatibel
Funktioniert mit allen vorhandenen WLAN-fähigen Geräten wie Tablets, Laptops, Smart-Home- und Streaming-Geräten.
Linksys App
Jederzeit und von überall aus haben Sie Ihr WLAN zu Hause voll im Griff
Die Linksys App bietet Ihnen über Ihr Smartphone oder Tablet Remote-Zugriff auf Ihr WLAN zu Hause, sodass Sie es immer kontrollieren und verwalten können.
- Gastzugriff: Richten Sie ein separates, passwortgeschütztes WLAN-Netzwerk für bis zu 50 Gäste ein und teilen Sie ihnen das Passwort bequem mit.
- Kinderschutzfunktionen: Sorgen Sie für einen geschützten Internetzugang Ihrer Kinder, auch wenn Sie nicht vor Ort sind. Beschränken Sie den Zugang zu unangemessenen Inhalten oder Websites, die ablenken könnten, kontrollieren Sie die Nutzung und blockieren Sie den Internetzugang bestimmter Geräte.
- Gerätepriorisierung: Geben Sie den Geräten, die die höchste Geschwindigkeit benötigen, den Vorrang.
- Geschwindigkeitstest: Die Geschwindigkeit Ihrer Internetverbindung lässt sich einfach überprüfen und kontrollieren.
Schnelles und einfaches Setup
Die Verwaltung Ihres WLANs zu Hause erfolgt mit der Linksys App schnell und einfach:
****Laden Sie die Linksys App herunter****
****Stellen Sie eine Verbindung mit Ihrem Modem her****
****Geben Sie Ihrem WLAN einen Namen und erstellen Sie ein Passwort****
Related news
A heap-use-after-free flaw was found in ImageMagick's RelinquishDCMInfo() function of dcm.c file. This vulnerability is triggered when an attacker passes a specially crafted DICOM image file to ImageMagick for conversion, potentially leading to information disclosure and a denial of service.
Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability.
A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.
A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.
A NULL pointer dereference flaw was found in pesign's cms_set_pw_data() function of the cms_common.c file. The function fails to handle the NULL pwdata invocation from daemon.c, which leads to an explicit NULL dereference and crash on all attempts to daemonize pesign.
A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
IBM UrbanCode Deploy (UCD) 7.1.1.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.
A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.
A cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS <= 4.2.1 version via "List of subjects".
Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the "malicious" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks. A patch with a fix is available on the `master` branch of the GitHub repository. This can also be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `flask.safe_join` to join untrusted paths or replace `flask.send_file` ...
A vulnerability has been found in automad up to 1.10.9 and classified as problematic. This vulnerability affects the Dashboard. The manipulation of the argument title with the input Home</title><script>alert("home")</script><title> leads to a cross site scripting. The attack can be initiated remotely but requires an authentication. The exploit details have disclosed to the public and may be used.
Exclusive Threatpost research examines organizations’ top cloud security concerns, attitudes towards zero-trust and DevSecOps.
Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.
SQL injection vulnerability in ARAX-UI Synonym Lookup functionality in GitHub repository rtxteam/rtx prior to checkpoint_2022-04-20 . This vulnerability is critical as it can lead to remote code execution and thus complete server takeover.
FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format.
Solar appScreener through 3.10.4, when a valid license is not present, allows XXE and SSRF attacks via a crafted XML document.
zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are specific to a given server-side URL rewrite mechanism. When these headers are present on systems not running the specific URL rewriting mechanism, the logic would still trigger, allowing a malicious client or proxy to emulate the headers to request arbitrary content.
### Impact Multiple tokens for password reset could be requested. All tokens could be used to change the password. This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two hours. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
### Impact The CSRF tokens were not renewed after login and logout. An attacker could impersonate the victim if the attacker is able to use the same device as the victim used beforehand. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak. When a malicious request is sent to the client registration endpoint, the error message is not properly escaped, allowing an attacker to execute malicious scripts into the user's browser. ### Acknowledgement Keycloak would like to thank Quentin TEXIER (Pentester at Opencyber) for reporting this issue.
### Impact Not-stored XSS in storefront. Request parameter were directly assigned to the template, so that malicious code could be send via an URL. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/changelog-sw5/#5-7-9 For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 211408.
IBM InfoSphere Information Server 11.7 could allow an authenticated user to view information of higher privileged users and groups due to a privilege escalation vulnerability. IBM X-Force ID: 224426.
Mahara before 20.10.5, 21.04.4, 21.10.2, and 22.04.0 allows stored XSS when a particular Cascading Style Sheets (CSS) class for embedly is used, and JavaScript code is constructed to perform an action.
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 224440.
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 218370.
In Mahara before 20.10.5, 21.04.4, 21.10.2, and 22.04.0, a site using Isolated Institutions is vulnerable if more than ten groups are used. They are all shown from page 2 of the group results list (rather than only being shown for the institution that the viewer is a member of).
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 223720.
A cross-site scripting (XSS) vulnerability in PHP MySQL Admin Panel Generator v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected at /edit-db.php.
Shopware is an open source e-commerce software platform. Prior to version 5.7.9, Shopware is vulnerable to non-stored cross-site scripting in the storefront. This issue is fixed in version 5.7.9. Users of older versions may attempt to mitigate the vulnerability by using the Shopware security plugin.
IBM UrbanCode Deploy (UCD) 7.2.2.1 could allow an authenticated user with special permissions to obtain elevated privileges due to improper handling of permissions. IBM X-Force ID: 217955.
NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot module tegrabl_cbo.c, where insufficient validation of untrusted data may allow a local attacker to cause a memory buffer overflow, which may lead to code execution, loss of integrity, limited denial of service, and some impact to confidentiality.