Netgear has beta firmware for some vulnerable routers and officially acknowledged the vulnerability is in additional models. Netgear stepped up by publishing a list of routers which are vulnerable to attack as well as releasing beta firmware to patch some of those models.The company confirmed the existence of the flaw which US-CERT believed was dangerous enough to advise users to stop using vulnerable routers. In addition to the originally announced vulnerable Netgear routers models R6400, R7000, R8000, Netgear warned that nine other router models are also vulnerable.Here are the 12 routers Netgear admitted are vulnerable to attack; any model with a link goes to the firmware release page and upgrade instructions.R6250R6400R6700R6900R7000R7100LGR7300DSTR7900R8000D6220D6400D7000That doesn’t necessarily mean you should breathe a sigh of relief if your router is not on the list, since Netgear said it is still testing its “entire portfolio for other routers that might be affected by this vulnerability. If any other routers are affected by the same security vulnerability, we plan to release firmware to fix those as well.” If any more routers are deemed by Netgear to be vulnerable, they will be added to the security advisory. The list above serves as informative for affected users as well as documents the original list in case additional router models are added.Speaking of other router models which are vulnerable, security researcher Kalypto Pink has tested a wide range of Netgear routers and found others with the same flaw. Below are the models Pink listed which were not also listed by Netgear once the company finally took action. NetGear AC5300-AC5300 Nighthawk X8 Tri-Band WiFi Router (Model R8500)NetGear AD7200-Nighthawk X10 Smart WiFi Router (R9000)NetGear AC2300-Nighthawk Smart WiFi Router with MU-MIMO (Model R7000P)NetGear AC2350-Nighthawk X4 AC 2350 Dual Band WiFi Router (Model R7500)NetGear AC2600-Nighthawk X4S Smart WiFi Gaming Router (Model R7800)It remains to be seen if Netgear will add those to its own vulnerable router list and provide less insecure firmware.Netgear’s official statement didn’t include the insincere platitude about how important its customers’ security is the to the company, but it did include a different statement that seems equally as questionable.The Netgear router vulnerability was discovered by a security researcher going by Acew0rm; he said he reported the vulnerability to Netgear four months ago. So, forgive me for scoffing at Netgear’s statement of: “Being pro-active rather than re-active to emerging security issues is fundamental for product support at Netgear.”Taking a third of a year to react only after US-CERT told vulnerable router owners to unplug them is not what I’d call pro-active.Shodan showed almost 10,000 vulnerable Netgear routers; even after new firmware is available, there will be thousands of non-technical people who are unaware of the issue and have never manually updated router firmware.Netgear also officially said it strives “to earn and maintain the trust of those that use Netgear products for their connectivity.” To earn and maintain my trust, the company should hurry up with listing all vulnerable models and get out new dependable firmware. If it doesn’t want its user base to turn to another brand, then the company should also avoid releasing any more statements which could be systematically ripped apart. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe