In April 2022, we became aware of a possible exploit affecting some of our products that was identified during testing and reported to us*. We are not aware of any exploits of this in the wild and started to release firmware updates in May 2022.
Our standard best practice recommendation is to always keep firmware up to date, but we recommend that you check that affected units are running at least the firmware version in the table below. To protect users until all firmware versions were available and to give time for upgrades no other information about the issue was released originally. The vulnerability has now been announced under CVE-2022-32548 and is related to a possible exploit of the router's Web UI login page.
DrayTek new firmwares with security updates for this vulnerability are shown as follows.
Affected Model | Fixed Firmware Version |
---|---|
Vigor3910 | 4.3.1.1 |
Vigor3220 Series | 3.9.7.2 |
Vigor2962 Series | 4.3.1.1 |
Vigor2952 / 2952P | 3.9.7.2 |
Vigor2927 Series | 4.4.0 |
Vigor2927 LTE Series | 4.4.0 |
Vigor2926 Series | 3.9.8.1 |
Vigor2926 LTE Series | 3.9.8.1 |
Vigor2925 Series | 3.9.2 |
Vigor2925 LTE Series | 3.9.2 |
Vigor2915 Series | 4.3.3.2 |
Vigor2912 | 3.8.15 |
Vigor2866 Series | 4.4.0 |
Vigor2866 LTE Series | 4.4.0 |
Vigor2865 Series | 4.4.0 |
Vigor2865 LTE Series | 4.4.0 |
Vigor2862 Series | 3.9.8.1 |
Vigor2862 LTE Series | 3.9.8.1 |
Vigor2860 Series | 3.9.2 |
Vigor2860 LTE Series | 3.9.2 |
Vigor2832 | 3.9.6.1 |
Vigor2766 Series | 4.4.2 |
Vigor2765 Series | 4.4.2 |
Vigor2762 Series | 3.9.6.4 |
Vigor2760 Series | 3.8.9.6 |
Vigor2620 LTE Series | 3.9.8.1 |
VigorLTE 200n | 3.9.8.1 |
Vigor2135 Series | 4.4.2 |
Vigor2133 Series | 3.9.6.4 |
Vigor1000B | 4.3.1.1 |
Vigor166 | 4.2.4 |
Vigor165 | 4.2.4 |
*Thank you for Trellix Threat Labs Vulnerability Research team for their testing and prompt reporting.
Should you have any security-related inquiry regarding one of our products, please contact DrayTek Technical Support.