CVE-2016-10115
high-risk
Published 2017-01-04
NETGEAR Arlo base stations with firmware 1.7.5_6178 and earlier, Arlo Q devices with firmware 1.8.0_5551 and earlier, and Arlo Q Plus devices with firmware 1.8.1_6094 and earlier have a default password of 12345678, which makes it easier for remote attackers to obtain access after a factory reset or in a factory configuration.
Do I need to act?
~
6.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (3)
Arlo Base Station Firmware
Arlo Q Camera Firmware
Arlo Q Plus Camera Firmware
Affected Vendors
References (6)
Third Party Advisory
http://blog.newskysecurity.com/2016/09/factory_reset_vuln_in_netgear_arlo/
Third Party Advisory
http://www.securityfocus.com/bid/95265
Third Party Advisory
http://blog.newskysecurity.com/2016/09/factory_reset_vuln_in_netgear_arlo/
Third Party Advisory
http://www.securityfocus.com/bid/95265
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
9/34 · Low
Exposure
9/34 · Low