NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
ALL FIRMWARE should be updated. More info: https://betanews.com/2017/10/16/krack-wpa2-security-vulnerability/
36 Comments
- tacoFelineApprenticeNETGEAR L2 Support says: "Our engineers are still working on a web page that explains this in more details and provides a lookup table where you will be able to check if their product is within support." 27 Oct. 2017
PLEASE PATCH NIGHTHAWK D7000
- minimemeTutor
fwiw,
the FCC approval date: 07 August 2013 the page there doesn't show an actual release date.
https://wikidevi.com/wiki/Netgear_R7000
wouldn't have ever guessed that this router is actually older than my r6220, which was released
FCC approval date: 07 October 2014
(Est.) release date: 02 December 2014
https://wikidevi.com/wiki/Netgear_R6220
posted that info mainly for my own future reference
What is EOL for the R7000 ?
- tacoFelineApprentice
"NETGEAR provides security updates to fix vulnerabilities or upgrade security in products for the longer of four years after product release date or two years after product end of life." - NETGEAR L2 Support
I am currently inquiring as to if and where this is listed on the website, and where it can be found for each individual product. Did others know of this? - tacoFelineApprentice
NETGEAR does seem to be taking the money, barely supporting, and then running away with the money. Hard to tell, they're being tight-lipped.
Do you know anyone, any groups, that are getting the word out on this? NETGEAR may only respond to pressure, not appeals to morality. - R7000 running firmware version 1.0.9.12 or earlier - HOW ABOUT AN UPDATE ALREADY? TEN DAYS NOT LONG ENOUGH FOR YA? :-(
WHERE ARE OUR SECURITY PATCHES?
IS NETGEAR CONTENT TO TAKE THE MONEY AND RUN?!?!?!
TIME TO GET THE WORD OUT ON FACEBOOK, TWITTER, INSTAGRAM, ETC...
- tacoFelineApprentice
Netgear isn't offering patches for a load of vulnerable devices, and I'm still trying to get a support/lifecycle policy out of them. There are also other known vulnerabilities with other products, which they have not addressed.
Note that Netgear is mostly ignoring CERT: http://www.kb.cert.org/vuls/id/CHEU-AQNMYE
They also seem to have disabled all or all but one thread using the word "KRACK" as search terms.
I'm unsure if they care about consumers, but getting the word out to businesses that Netgear is horrible on security might be a wake-up call for them. - r_steerNoviceAnswered my own question -- R7000 Firmware Version 1.0.9.12 DOES NOT address the KRACK vulnerability. No newer version of the firmware is currently available. See: https://kb.netgear.com/000049498/Security-Advisory-for-WPA-2-Vulnerabilities-PSV-2017-2826-PSV-2017-2836-PSV-2017-2837 That page simply says the "Netgear is aware of the vulnerability", and then they try to play down its significance. They make no statement about providing patches. Very disappointing -- maybe time to upgrade to a brand that has patched this.