The Norton Core router may be susceptible to a command injection exploit. This is a type of attack in which the goal is execution of arbitrary commands on the host system via vulnerable software.
The issue was validated by the product team engineers. A Norton Core update, v237, has been released which addresses the aforementioned issue. Note that Norton Core updates are received to devices automatically via firmware updates to the router. At this time, Symantec is not aware of any exploitations or adverse customer impact from these issues.
Symantec recommends the following measures to reduce risk of attack:
To ensure that Norton Core stays up to date, keep it powered on and connected to the internet
Maintain an active Norton subscription
Enable Multi-Factor Authentication (MFA) on the Norton Account associated with Norton Core
Ensure that the Norton Core app on your mobile device is up-to-date
Use strong WiFi passwords
Use recommended strong encryption options for the WiFi network, such as WPA-2 (AES)
Use recommended DNS services, such as those offered by DNSSEC DNS providers
Limit or avoid the use of UPnP from Norton Core
Limit or avoid the use of Port Forwarding from Norton Core
Limit or avoid the use of daisy-chained routers with Norton Core
Avoid risky web behavior, such as visiting or downloading software from untrusted websites
Use security software such as Norton Security on all devices that support it
Alexander Rumyantsev (email@example.com) from Embedi (CVE-2018-5234)
This is machine translated content
Login to Subscribe
Please login to set up your
Would you like to be subscribed to future notifications for this article?
For security reasons, your link to this document has expired. Please click on the attachment link to access this file.
The attachment that you are looking for no longer exists.
There has been an issue retrieving your attachment. Please try again.
Currently server is down.
Didn't find the article you were looking for? Try these resources.