Mailing List
Mailing List
Sign Up Here
Like, follow & share: visit DrayTek UK's Facebook page visit DrayTek UK's Twitter page visit DrayTek UK's Linkedin page
DrayTek

Security Advisory: NetUSB Vulnerability

 

In May 2015, news broke of a buffer overflow vulnerability in the KCodes NetUSB module known by the identifications  VU#177092 or CVE-2015-3036.  The affected code is used in many common brands of router and other embedded systems. As well as being known as 'NetUSB' some vendors call the feature 'ReadyShare' or refer to it by some other networking/USB related moniker.  You can read more details on the above links.

The exploit itself requires that a hacker sends a malformed packet (one with a longer device name) to a vulnerable router. This causes a memory corruption and in turn allows the attacker to execute arbitary code. Once he/she has that, he could mount a denial of service attack to cause the device to reboot or potentially run code remotely.

 

DrayTek Products

 

No DrayTek products are affected by this vulnerability.

Most DrayTek products use our own proprietary operating system (DrayOS) which does not make use of standard open-source or Linux software and libraries.  No DrayTek products use any version of the NetUSB code.  Regardless of this, it is always recommended that you keep your router and other hardware up to date with the latest hardware and read vendor mailing lists (UK users can join here).

 

Advice Regarding other Services / Products (non-DrayTek)

You should check equivalent statements/advisories from the providers of all of your other networking hardware vendors and then follow the advice of each of them regarding any necessary precautions or updates. 


Disclaimer : Please check this web page again for any new/updated information. You are advised to always keep your product's firmware or software up-to-date and keep in touch with your vendors to be advised of any new vulnerabilities (for example by subscribing to mailing lists). The information is this web page is provided in good faith based on the the information available to us at the current time, following an appropriate assessment but without acceptance of liability in the case of new, developing or existing threats or unlawful activity against your system. Any suggestions given above are provided as general information but should not be considered a thorough or specific assessment of your own individual security risks and you should take formal advice from a security expert to assess your specific security needs. As with any advisory, the suggested advice forms part of your own security planning and protocols.