The University of Wisconsin-Madison has published details of a large flood of traffic originating from Netgear routers affecting the university Network Time Protocol (NTP) servers.
The main problem is that a range of Netgear devices, specifically the DG814, RP614, MR814 and HR314 have their NTP server IP address hardcoded with a poll interval of only one second if the server does not respond. Effectively this resulted in a widespread Denial of Service attack, since there are around 500,000 Netgear routers operating in the public domain. The full details of the flood are documented here.
The solution is fairly simple, Netgear firmware has moved on and in general fixes the problem, the earliest versions of firmware that include the fixes are listed here. The latest firmware for the DG814 can be obtained from Netgear, before installing the firmware be sure to read the appropriate Installation Guide.
There are currently no comments about this news item.