Draytek support
On the 13th Feb I got two emails from Draytek, one listing 8 vulnerabilities. One highlighting two critical vulnerabilities that were listed in the previous email.
The critical vulnerabilities;
CVE number CVSS
CVE-2024-51138 9.8
CVE-2024-51139 9.8
Both led to buffer overflow.
Guidance about the update stated the following;
3. If remote access is enabled:
Disable it unless absolutely necessary.
Use an access control list (ACL) and enable 2FA if possible.
For unpatched routers, disable both remote access (admin) and SSL VPN.
Note: ACL doesn't apply to SSL VPN (Port 443), so temporarily disable SSL VPN until upgraded.
As has been previously commented, recommended minimum firmware was listed differently in the emails.
Fortunately I do not use VPN or remote access, both are disabled. I updated the firmware, to the most recent, the following day and have had no issues.
I was fortunate. I have easy access, on site, to this equipment. I really feel for those that support this stuff remotely.
I would suggest however that many people buy Draytek because it is reliable SME level kit that plays well as an ecosystem.
Some of the users of such kit may leave it on a shelf or in a cupboard a little neglected as Draytek doesn’t seem to get attacked as much as other larger providers.
If anything this story should give us an idea of how much kit is out there and perhaps prod us all to make sure we maintain it?
Honestly I sleep better at night knowing my Draytek kit is maintained rather than other stuff that “auto updates” but doesn’t offer you the ability to check/force an update,