Vulnerabilites related to netgear - gs108t_firmware
Vulnerability from fkie_nvd
Published
2020-04-29 14:15
Modified
2024-11-21 03:21
Severity ?
Summary
Certain NETGEAR devices are affected by debugging command execution. This affects FS752TP 5.4.2.19 and earlier, GS108Tv2 5.4.2.29 and earlier, GS110TP 5.4.2.29 and earlier, GS418TPP 6.6.2.6 and earlier, GS510TLP 6.6.2.6 and earlier, GS510TP 5.04.2.27 and earlier, GS510TPP 6.6.2.6 and earlier, GS716Tv2 5.4.2.27 and earlier, GS716Tv3 6.3.1.16 and earlier, GS724Tv3 5.4.2.27 and earlier, GS724Tv4 6.3.1.16 and earlier, GS728TPSB 5.3.0.29 and earlier, GS728TSB 5.3.0.29 and earlier, GS728TXS 6.1.0.35 and earlier, GS748Tv4 5.4.2.27 and earlier, GS748Tv5 6.3.1.16 and earlier, GS752TPSB 5.3.0.29 and earlier, GS752TSB 5.3.0.29 and earlier, GS752TXS 6.1.0.35 and earlier, M4200 12.0.2.10 and earlier, M4300 12.0.2.10 and earlier, M5300 11.0.0.28 and earlier, M6100 11.0.0.28 and earlier, M7100 11.0.0.28 and earlier, S3300 6.6.1.4 and earlier, XS708T 6.6.0.11 and earlier, XS712T 6.1.0.34 and earlier, and XS716T 6.6.0.11 and earlier.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:fs752tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCAF6CBC-713C-4BCD-BA73-29BD5E6B2CC0", "versionEndIncluding": "5.4.2.19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:fs752tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA58F24F-EC29-4592-BAD6-F7710F897E76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07615C61-628A-4168-AEB5-BBEB8E14D039", "versionEndIncluding": "5.4.2.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs108tv2:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A9045AE-E205-4FE2-9DD8-51EFA8D9B7EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C21A5F-460B-41AF-8C81-59B5C39AFF6F", "versionEndIncluding": "5.4.2.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3949875-D8ED-4280-B1C7-123674774C3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs418tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A3D5437-B5F7-4C11-9935-D95A848DF84D", "versionEndIncluding": "6.6.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs418tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFF539E-3159-4479-9BC5-AD2A5239415F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs510tlp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C26847F-3523-4455-90AB-A84E2422247D", "versionEndIncluding": "6.6.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs510tlp:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F54D4D-EB69-4B6A-B2D1-7D8013AB04D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs510tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4D4AE3C-6585-406D-B596-A9933AA8B57C", "versionEndIncluding": "5.04.2.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs510tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ED4BF26-254F-4550-8B8B-5F90CD4A2556", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs510tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57DD367F-50E8-48A2-B44F-FD6AE99A7BEF", "versionEndIncluding": "6.6.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs510tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE9C4447-DFC2-40B8-AD47-F7D8DDD34570", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAC7EA9C-0A45-40A4-85A9-563E8922ACB5", "versionEndIncluding": "5.4.2.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716t:v2:*:*:*:*:*:*:*", "matchCriteriaId": "5B93D08F-4C7B-4DE6-A72A-5AAAC3E42F29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47770B21-3153-4B10-817F-D47442D7C3BF", "versionEndIncluding": "6.3.1.16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716t:v3:*:*:*:*:*:*:*", "matchCriteriaId": "4B048480-9790-4267-9C12-ABADA7646A9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A21595F4-961A-42BE-A530-3304F23C5A24", "versionEndIncluding": "5.4.2.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724t:v3:*:*:*:*:*:*:*", "matchCriteriaId": "15240AAD-9CDF-4E78-A43D-0AD0A21F0A05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29FDAE41-1436-4695-9E40-68DC5050910B", "versionEndIncluding": "6.3.1.16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724t:v4:*:*:*:*:*:*:*", "matchCriteriaId": "8EF8C3CE-84D9-4BEE-85AE-82D8346BDECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tpsb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF656382-57CD-4017-859E-3A6FFD3E66AF", "versionEndIncluding": "5.3.0.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tpsb:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBECB631-64D3-4944-8E45-683FF12C1D89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tsb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30712720-94B0-4212-88C0-A5D9DC36C9A0", "versionEndIncluding": "5.3.0.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tsb:-:*:*:*:*:*:*:*", "matchCriteriaId": "73D5C8B5-E199-43E3-9C17-FBF55D916F8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728txs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69D579C0-A6FA-4200-9866-99C8E02BACC3", "versionEndIncluding": "6.1.0.35", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728txs:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB931A26-A4F1-4170-AA66-188C29B46AFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs748t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BC428D3-868A-421D-8AD8-1D8AF1522D82", "versionEndIncluding": "5.4.2.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs748t:v4:*:*:*:*:*:*:*", "matchCriteriaId": "BED8AA40-EC6E-4652-A6F8-57856EBDC16A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs748t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81FEC177-54A7-4D62-B6B8-53FA193B5D24", "versionEndIncluding": "6.3.1.16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs748t:v5:*:*:*:*:*:*:*", "matchCriteriaId": "C47152C0-F85E-4073-BE49-9DDF1C99E828", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tpsb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B8EA70D-EE90-41D9-978C-4377B49AA3FA", "versionEndIncluding": "5.3.0.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tpsb:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CD6B178-367D-446C-9EE9-5B2940AE6956", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tsb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6B92FCC-AD30-4C5B-AB31-12C564FB36B5", "versionEndIncluding": "5.3.0.29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tsb:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE5F207F-9977-4390-AB85-EAE8B385E87D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752txs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09F17244-9B03-4F30-B565-2A4F21EB6793", "versionEndIncluding": "6.1.0.35", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752txs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF2BD166-0AF7-48FE-B677-B5D28672DA74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:m4200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBD796E-9525-468B-81D1-9A848B3862D3", "versionEndIncluding": "12.0.2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:m4200:-:*:*:*:*:*:*:*", "matchCriteriaId": "80617DBE-44F0-44E1-B59A-9456D4995C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:m4300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04C8ED4F-822D-4BE5-AB37-D18B779C5AC8", "versionEndIncluding": "12.0.2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:m4300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C28AC8BD-6DDA-481B-A1E9-466A04FB9680", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:m5300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EA50A8A-FCF6-46F9-8E79-6A44ACF74CE7", "versionEndIncluding": "11.0.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:m5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "D10DCF81-D2AD-403C-AAB8-97ED936FD458", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:m6100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D7FAA5A-D2FC-4D29-B741-B13DD7F7974F", "versionEndIncluding": "11.0.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:m6100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CFDB23F-9895-42E4-88A1-83FE4A6D0709", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:m7100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E191EAA-A1D4-4629-B16B-AE1B5C8028A0", "versionEndIncluding": "11.0.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:m7100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5C43A67-C198-48C3-9CDB-6B2039C306B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:s3300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E1ED353-91DC-4A25-995A-0AEFB5B1AC3D", "versionEndIncluding": "6.6.1.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:s3300:-:*:*:*:*:*:*:*", "matchCriteriaId": "880C8ABD-7469-4D24-8878-D4BA299F890B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:xs708t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4C1664B-4794-4FC1-BF9F-A1329E572BDE", "versionEndIncluding": "6.6.0.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:xs708t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D78D4126-20E7-43C2-BD98-2BEAF2A5FD1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:xs712t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "06EE98ED-4348-4999-8259-493855582249", "versionEndIncluding": "6.1.0.34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:xs712t:-:*:*:*:*:*:*:*", "matchCriteriaId": "67E3C3C9-946B-4490-B018-152FF64C7A6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:xs716t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE8C9DD2-A69A-40B4-9AD1-E0F5B002877B", "versionEndIncluding": "6.6.0.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:xs716t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE86C949-F8F4-43FB-9089-9E0BE95A5FF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by debugging command execution. This affects FS752TP 5.4.2.19 and earlier, GS108Tv2 5.4.2.29 and earlier, GS110TP 5.4.2.29 and earlier, GS418TPP 6.6.2.6 and earlier, GS510TLP 6.6.2.6 and earlier, GS510TP 5.04.2.27 and earlier, GS510TPP 6.6.2.6 and earlier, GS716Tv2 5.4.2.27 and earlier, GS716Tv3 6.3.1.16 and earlier, GS724Tv3 5.4.2.27 and earlier, GS724Tv4 6.3.1.16 and earlier, GS728TPSB 5.3.0.29 and earlier, GS728TSB 5.3.0.29 and earlier, GS728TXS 6.1.0.35 and earlier, GS748Tv4 5.4.2.27 and earlier, GS748Tv5 6.3.1.16 and earlier, GS752TPSB 5.3.0.29 and earlier, GS752TSB 5.3.0.29 and earlier, GS752TXS 6.1.0.35 and earlier, M4200 12.0.2.10 and earlier, M4300 12.0.2.10 and earlier, M5300 11.0.0.28 and earlier, M6100 11.0.0.28 and earlier, M7100 11.0.0.28 and earlier, S3300 6.6.1.4 and earlier, XS708T 6.6.0.11 and earlier, XS712T 6.1.0.34 and earlier, and XS716T 6.6.0.11 and earlier." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una ejecuci\u00f3n de comandos de depuraci\u00f3n. Esto afecta a FS752TP versiones 5.4.2.19 y anteriores, GS108Tv2 versiones 5.4.2.29 y anteriores, GS110TP versiones 5.4.2.29 y anteriores, GS418TPP versiones 6.6.2.6 y anteriores, GS510TLP versiones 6.6.2.6 y anteriores, GS510TP versiones 5.04.2.27 y anteriores, GS510TPP versiones 6.6.2.6 y anteriores, GS716Tv2 versiones 5.4.2.27 y anteriores, GS716Tv3 versiones 6.3.1.16 y anteriores, GS724Tv3 versiones 5.4.2.27 y anteriores, GS724Tv4 versiones 6.3.1.16 y anteriores, GS728TPSB versiones 5.3.0.29 y anteriores, GS728TSB versiones 5.3.0.29 y anteriores, GS728TXS versiones 6.1.0. 35 y anteriores, GS748Tv4 versiones 5.4.2.27 y anteriores, GS748Tv5 versiones 6.3.1.16 y anteriores, GS752TPSB versiones 5.3.0.29 y anteriores, GS752TSB versiones 5.3.0.29 y anteriores, GS752TXS versiones 6.1.0.35 y anteriores, M4200 versiones 12.0.2.10 y anteriores, M4300 versiones 12.0.2. 10 y anteriores, M5300 versiones 11.0.0.28 y anteriores, M6100 versiones 11.0.0.28 y anteriores, M7100 versiones 11.0.0.28 y anteriores, S3300 versiones 6.6.1.4 y anteriores, XS708T versiones 6.6.0.11 y anteriores, XS712T versiones 6.1.0.34 y anteriores, y XS716T versiones 6.6.0.11 y anteriores." } ], "id": "CVE-2017-18860", "lastModified": "2024-11-21T03:21:06.917", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-29T14:15:14.013", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000038519/Security-Advisory-for-Authentication-Bypass-and-Remote-Command-Execution-on-Some-Smart-and-Managed-Switches-PSV-2017-0857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000038519/Security-Advisory-for-Authentication-Bypass-and-Remote-Command-Execution-on-Some-Smart-and-Managed-Switches-PSV-2017-0857" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-13 08:15
Modified
2024-11-21 06:24
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.1 (High) - CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.1 (High) - CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1CC9E5-8253-4924-8282-9E768661680E", "versionEndExcluding": "1.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E3ADD8-926C-46CD-ABDF-0F7C99879808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B8389CE-DA82-49C9-A431-7B2FE7C8950E", "versionEndExcluding": "1.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79979EF-D425-4199-BC73-36FB97EA9976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2C585B5-2EDE-41DD-A1DB-3F3B5DCB1C83", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE9EB1F-D49E-499A-B39B-7F15A1E5DAEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAAA5112-5735-4889-9F6C-4217D2CE58FC", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E095D139-28EE-4ADD-8FCD-3C2322AC3668", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5F5E8A3-6FB6-45B0-819A-95F88B6486DD", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*", "matchCriteriaId": "F2DA3649-BC53-496E-A78C-FFA471872B5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B241F5FC-3053-44ED-ABDE-F7E4C1F26E2D", "versionEndExcluding": "1.0.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tup:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A469DFA-DE46-444C-B007-F9932C61EE26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs308t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5EF9D41-5E0D-4BBC-BD8C-40422B29D241", "versionEndExcluding": "1.0.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs308t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C204CFAA-0709-421A-A907-8F5B093063F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs310tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A18B9E4-16A6-443B-A504-784FA821B404", "versionEndExcluding": "1.0.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs310tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6761CCD9-9D27-465F-8707-F23707A84803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17CEF560-AF2A-48AD-B8A4-666BD2ECBDCE", "versionEndExcluding": "1.0.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs710tup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F019BC-8BBB-40F4-A05C-172DCAC705C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E57F0167-9C61-44FB-A7BB-70F0A9247DB8", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9D88DD2-CE3F-431C-8FC8-01CBFB5AFED1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "421B0F3A-9A03-42B0-8B45-E77DFE176A6F", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB3B313-1667-401C-92CF-EBB03CF91010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "339698F2-2727-469D-82E4-8E025FCBB106", "versionEndExcluding": "2.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EB10210-B401-4944-832A-D31AEA8B3952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7710FD29-3D79-4260-875D-48BBC8B173BE", "versionEndExcluding": "2.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "E871CCB4-8093-44AE-B289-CF81F82A9DB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B67A12FE-8681-4789-896E-69B3E9057FE4", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4DE9FB-CAD5-45F9-A11C-1C20EE2FF3A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D623D8A0-ADEB-4476-9364-CFFAE4967784", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "7126D4F8-2E3C-478B-9BD2-8055DFB48D8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs750e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDFC5B41-EBAC-42C9-B12E-AAACC199F324", "versionEndExcluding": "1.0.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs750e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A56285CF-1BD8-4BB5-AC9C-9EDDFCFC9E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00504A9F-EBE8-4D88-98C6-52CC260EC944", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "995D8E9F-7AE6-4A17-A728-7190FB2CE8BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F7E762-95AB-4E8F-865C-C29A6B41DC4F", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "CDD4D404-9A22-408B-89CF-5107B809CB90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D620D42-9365-4A5E-957C-ADB9EAD56D8C", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CF12A57-ACFA-48AA-B41C-06EB7095C800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD52B5A4-0CF4-4E80-BD9B-05C1DFB855D2", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3A918F0-36BB-4EDE-98B8-00C3DC8F7BB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin\u0027s machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." }, { "lang": "es", "value": "Determinados smart switches de NETGEAR est\u00e1n afectados por una vulnerabilidad de secuestro de autenticaci\u00f3n por parte de un atacante no autenticado que usa la misma direcci\u00f3n IP de origen que un administrador en el proceso de inicio de sesi\u00f3n (por ejemplo, detr\u00e1s del mismo dispositivo NAT, o ya en posesi\u00f3n de un punto de apoyo en la m\u00e1quina de un administrador). Esto ocurre porque el proceso de autenticaci\u00f3n HTTP de varios pasos est\u00e1 efectivamente ligado s\u00f3lo a la direcci\u00f3n IP de origen. Esto afecta a GC108P versiones anteriores a 1.0.8.2, GC108PP versiones anteriores a 1.0.8.2, GS108Tv3 versiones anteriores a 7.0.7.2, GS110TPP versiones anteriores a 7.0.7.2, GS110TPv3 versiones anteriores a 7. 0.7.2, GS110TUP versiones anteriores a 1.0.5.3, GS308T versiones anteriores a 1.0.3.2, GS310TP versiones anteriores a 1.0.3.2, GS710TUP versiones anteriores a 1.0.5.3, GS716TP versiones anteriores a 1.0.4. 2, GS716TPP versiones anteriores a 1.0.4.2, GS724TPP versiones anteriores a 2.0.6.3, GS724TPv2 versiones anteriores a 2.0.6.3, GS728TPPv2 versiones anteriores a 6.0.8.2, GS728TPv2 versiones anteriores a 6.0.8. 2, GS750E versiones anteriores a 1.0.1.10, GS752TPP versiones anteriores a 6.0.8.2, GS752TPv2 versiones anteriores a 6.0.8.2, MS510TXM versiones anteriores a 1.0.4.2 y MS510TXUP versiones anteriores a 1.0.4.2" } ], "id": "CVE-2021-40867", "lastModified": "2024-11-21T06:24:58.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-13T08:15:13.323", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gynvael.coldwind.pl/?id=741" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gynvael.coldwind.pl/?id=741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-05-21 23:15
Modified
2024-11-21 06:08
Severity ?
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netgear | gc108p_firmware | * | |
netgear | gc108p | - | |
netgear | gc108pp_firmware | * | |
netgear | gc108pp | - | |
netgear | gs108t_firmware | * | |
netgear | gs108tv3 | - | |
netgear | gs110tpp_firmware | * | |
netgear | gs110tpp | v1 | |
netgear | gs110tp_firmware | * | |
netgear | gs110tp | v3 | |
netgear | gs110tup_firmware | * | |
netgear | gs110tup | v1 | |
netgear | gs710tup_firmware | * | |
netgear | gs710tup | v1 | |
netgear | gs716tp_firmware | * | |
netgear | gs716tp | - | |
netgear | gs716tpp_firmware | * | |
netgear | gs716tpp | - | |
netgear | gs724tpp_firmware | * | |
netgear | gs724tpp | v1 | |
netgear | gs724tp_firmware | * | |
netgear | gs724tp | v2 | |
netgear | gs728tpp_firmware | * | |
netgear | gs728tpp | v2 | |
netgear | gs728tp_firmware | * | |
netgear | gs728tp | v2 | |
netgear | gs752tpp_firmware | * | |
netgear | gs752tpp | v1 | |
netgear | gs752tp_firmware | * | |
netgear | gs752tp | v2 | |
netgear | ms510txm_firmware | * | |
netgear | ms510txm | - | |
netgear | ms510txup_firmware | * | |
netgear | ms510txup | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C620986-DC5A-41CC-A98B-889A17BC0ACF", "versionEndExcluding": "1.0.7.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E3ADD8-926C-46CD-ABDF-0F7C99879808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C3F71EB-072D-4B7E-9919-7E55536F6EEE", "versionEndExcluding": "1.0.7.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79979EF-D425-4199-BC73-36FB97EA9976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A05E3C7-6428-4450-8583-489AD5D46527", "versionEndExcluding": "7.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE9EB1F-D49E-499A-B39B-7F15A1E5DAEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C940AFA-F467-4DC1-8132-606579937978", "versionEndExcluding": "7.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tpp:v1:*:*:*:*:*:*:*", "matchCriteriaId": "0633037A-6C03-4006-BACE-E0892476489D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4635972F-C455-4A72-9586-D977590156CE", "versionEndExcluding": "7.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*", "matchCriteriaId": "F2DA3649-BC53-496E-A78C-FFA471872B5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0612883-028F-40CA-A0E8-E3C8450B2A80", "versionEndExcluding": "1.0.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tup:v1:*:*:*:*:*:*:*", "matchCriteriaId": "99672C73-B9EA-4507-8803-9D87F59B9BF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8133024D-0E3D-4E4E-94B3-AFD03E352592", "versionEndExcluding": "1.0.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs710tup:v1:*:*:*:*:*:*:*", "matchCriteriaId": "53C87DD8-98AF-4D2E-8BD8-5F0DE771EB6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3DF66B6-AF7B-4504-808E-1F714E727702", "versionEndExcluding": "1.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9D88DD2-CE3F-431C-8FC8-01CBFB5AFED1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52F1C3E3-4B6B-4B28-A7E0-051E14276981", "versionEndExcluding": "1.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB3B313-1667-401C-92CF-EBB03CF91010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC19F224-54AA-40D4-A105-3C5E673E30A8", "versionEndExcluding": "2.0.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724tpp:v1:*:*:*:*:*:*:*", "matchCriteriaId": "14D5A2DB-7837-4CB4-ADCD-E0890E893E1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2163D47-4512-43C4-B794-EB98AF1A032F", "versionEndExcluding": "2.0.4.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "E871CCB4-8093-44AE-B289-CF81F82A9DB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E20C106F-5C99-4CA1-BFB5-4AAAC15ACA42", "versionEndExcluding": "6.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4DE9FB-CAD5-45F9-A11C-1C20EE2FF3A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BE5E6E3-AF0C-44F6-AFC7-78BCFA8B2ABB", "versionEndExcluding": "6.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "7126D4F8-2E3C-478B-9BD2-8055DFB48D8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFE86EBE-3C4C-45A2-BDF6-5F8929A88A2A", "versionEndExcluding": "6.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tpp:v1:*:*:*:*:*:*:*", "matchCriteriaId": "9C23B837-890A-4888-B875-94046F846CC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B54BD6-EE51-472D-817F-16CA2DB1541C", "versionEndExcluding": "6.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "CDD4D404-9A22-408B-89CF-5107B809CB90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6F0C7DF-8542-4FB2-8081-9A1F77FD7DD0", "versionEndExcluding": "1.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CF12A57-ACFA-48AA-B41C-06EB7095C800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AC99505-9E3B-4F33-8E97-2F98A817A23B", "versionEndExcluding": "1.0.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3A918F0-36BB-4EDE-98B8-00C3DC8F7BB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=\u0027;$HTTP_USER_AGENT;\u0027 with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una inyecci\u00f3n de comandos por un atacante no autenticado por medio de la biblioteca vulnerable /sqfs/lib/libsal.so.0.0 usado por una aplicaci\u00f3n CGI, como es demostrado por setup.cgi?token=\u0027;$HTTP_USER_AGENT;\u0027\u0026#xa0;con un comando del sistema operativo en el campo User-Agent.\u0026#xa0;Esto afecto a GC108P versiones anteriores a1.0.7.3, GC108PP versiones anteriores a 1.0.7.3, GS108Tv3 versiones anteriores a 7.0.6.3, GS110TPPv1 versiones anteriores a 7.0.6.3, GS110TPv3 versiones anteriores a 7.0.6.3, GS110TUPv1 versiones anteriores a 1.0.4.3, GS710TUPv1 versiones anteriores a 1.0.4.3, GS716TP versiones anteriores a 1.0.2.3, GS716TPP versiones anteriores a 1.0.2.3, GS724TPPv1 versiones anteriores a 2.0.4.3, GS724TPv2 versiones anteriores a 2.0.4.3, GS728TPPv2 versiones anteriores a 6.0.6.3, GS728TPv2 versiones anteriores a 6.0.6.3, GS752TPPv1 versiones anteriores a 6.0.6.3, GS752TPv2 versiones anteriores a 6.0.6.3, MS510TXM versiones anteriores a 1.0.2.3, y MS510TXUP versiones anteriores a 1.0.2.3" } ], "id": "CVE-2021-33514", "lastModified": "2024-11-21T06:08:59.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-21T23:15:07.377", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gynvael.coldwind.pl/?lang=en\u0026id=733" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gynvael.coldwind.pl/?lang=en\u0026id=733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-26 01:15
Modified
2024-11-21 06:32
Severity ?
5.2 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Certain NETGEAR devices are affected by stored XSS. This affects GS108Tv2 before 5.4.2.36 and GS110TPv2 before 5.4.2.36.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netgear | gs108t_firmware | * | |
netgear | gs108t | v2 | |
netgear | gs110tp_firmware | * | |
netgear | gs110tp | v2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "017F37E5-F12A-4F89-A65F-9344009EBBC9", "versionEndExcluding": "5.4.2.36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs108t:v2:*:*:*:*:*:*:*", "matchCriteriaId": "B77C7A93-1FE7-433F-9049-8F40BB071AD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6886B1C4-5480-4880-B436-7DBAA6C92046", "versionEndExcluding": "5.4.2.36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "5ECDB88D-8257-4F2A-9C2E-71F100F7996E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by stored XSS. This affects GS108Tv2 before 5.4.2.36 and GS110TPv2 before 5.4.2.36." }, { "lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por un ataque de tipo XSS almacenado. Esto afecta a GS108Tv2 versiones anteriores a 5.4.2.36 y GS110TPv2 versiones anteriores a 5.4.2.36" } ], "id": "CVE-2021-45677", "lastModified": "2024-11-21T06:32:51.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.7, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-26T01:15:21.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.netgear.com/000064448/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Smart-Managed-Pro-Switches-PSV-2019-0191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://kb.netgear.com/000064448/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Smart-Managed-Pro-Switches-PSV-2019-0191" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-13 08:15
Modified
2024-11-21 06:24
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1CC9E5-8253-4924-8282-9E768661680E", "versionEndExcluding": "1.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E3ADD8-926C-46CD-ABDF-0F7C99879808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B8389CE-DA82-49C9-A431-7B2FE7C8950E", "versionEndExcluding": "1.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79979EF-D425-4199-BC73-36FB97EA9976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2C585B5-2EDE-41DD-A1DB-3F3B5DCB1C83", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE9EB1F-D49E-499A-B39B-7F15A1E5DAEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAAA5112-5735-4889-9F6C-4217D2CE58FC", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E095D139-28EE-4ADD-8FCD-3C2322AC3668", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5F5E8A3-6FB6-45B0-819A-95F88B6486DD", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*", "matchCriteriaId": "F2DA3649-BC53-496E-A78C-FFA471872B5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B241F5FC-3053-44ED-ABDE-F7E4C1F26E2D", "versionEndExcluding": "1.0.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tup:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A469DFA-DE46-444C-B007-F9932C61EE26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs308t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5EF9D41-5E0D-4BBC-BD8C-40422B29D241", "versionEndExcluding": "1.0.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs308t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C204CFAA-0709-421A-A907-8F5B093063F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs310tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A18B9E4-16A6-443B-A504-784FA821B404", "versionEndExcluding": "1.0.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs310tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6761CCD9-9D27-465F-8707-F23707A84803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17CEF560-AF2A-48AD-B8A4-666BD2ECBDCE", "versionEndExcluding": "1.0.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs710tup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F019BC-8BBB-40F4-A05C-172DCAC705C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E57F0167-9C61-44FB-A7BB-70F0A9247DB8", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9D88DD2-CE3F-431C-8FC8-01CBFB5AFED1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "421B0F3A-9A03-42B0-8B45-E77DFE176A6F", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB3B313-1667-401C-92CF-EBB03CF91010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "339698F2-2727-469D-82E4-8E025FCBB106", "versionEndExcluding": "2.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EB10210-B401-4944-832A-D31AEA8B3952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7710FD29-3D79-4260-875D-48BBC8B173BE", "versionEndExcluding": "2.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "E871CCB4-8093-44AE-B289-CF81F82A9DB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B67A12FE-8681-4789-896E-69B3E9057FE4", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4DE9FB-CAD5-45F9-A11C-1C20EE2FF3A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D623D8A0-ADEB-4476-9364-CFFAE4967784", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "7126D4F8-2E3C-478B-9BD2-8055DFB48D8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs750e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDFC5B41-EBAC-42C9-B12E-AAACC199F324", "versionEndExcluding": "1.0.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs750e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A56285CF-1BD8-4BB5-AC9C-9EDDFCFC9E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00504A9F-EBE8-4D88-98C6-52CC260EC944", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "995D8E9F-7AE6-4A17-A728-7190FB2CE8BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F7E762-95AB-4E8F-865C-C29A6B41DC4F", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "CDD4D404-9A22-408B-89CF-5107B809CB90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D620D42-9365-4A5E-957C-ADB9EAD56D8C", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CF12A57-ACFA-48AA-B41C-06EB7095C800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD52B5A4-0CF4-4E80-BD9B-05C1DFB855D2", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3A918F0-36BB-4EDE-98B8-00C3DC8F7BB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." }, { "lang": "es", "value": "Determinados smart switches de NETGEAR est\u00e1n afectados por un cambio de contrase\u00f1a de administrador remoto por parte de un atacante no autenticado por medio del demonio /sqfs/bin/sccd (desactivado por defecto), que no comprueba la autenticaci\u00f3n cuando falta el TLV de autenticaci\u00f3n en un paquete NSDP recibido. Esto afecta a GC108P versiones anteriores a 1.0.8.2, GC108PP versiones anteriores a 1.0.8.2, GS108Tv3 versiones anteriores a 7.0.7.2, GS110TPP versiones anteriores a 7.0.7.2, GS110TPv3 versiones anteriores a 7. 0.7.2, GS110TUP versiones anteriores a 1.0.5.3, GS308T versiones anteriores a 1.0.3.2, GS310TP versiones anteriores a 1.0.3.2, GS710TUP versiones anteriores a 1.0.5.3, GS716TP versiones anteriores a 1.0.4. 2, GS716TPP versiones anteriores a 1.0.4.2, GS724TPP versiones anteriores a 2.0.6.3, GS724TPv2 versiones anteriores a 2.0.6.3, GS728TPPv2 versiones anteriores a 6.0.8.2, GS728TPv2 versiones anteriores a 6.0.8. 2, GS750E versiones anteriores a 1.0.1.10, GS752TPP versiones anteriores a 6.0.8.2, GS752TPv2 versiones anteriores a 6.0.8.2, MS510TXM versiones anteriores a 1.0.4.2 y MS510TXUP versiones anteriores a 1.0.4.2" } ], "id": "CVE-2021-40866", "lastModified": "2024-11-21T06:24:58.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-13T08:15:08.037", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gynvael.coldwind.pl/?id=740" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gynvael.coldwind.pl/?id=740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-16 22:15
Modified
2024-11-21 06:26
Severity ?
Summary
Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1CC9E5-8253-4924-8282-9E768661680E", "versionEndExcluding": "1.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E3ADD8-926C-46CD-ABDF-0F7C99879808", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B8389CE-DA82-49C9-A431-7B2FE7C8950E", "versionEndExcluding": "1.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79979EF-D425-4199-BC73-36FB97EA9976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2C585B5-2EDE-41DD-A1DB-3F3B5DCB1C83", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE9EB1F-D49E-499A-B39B-7F15A1E5DAEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAAA5112-5735-4889-9F6C-4217D2CE58FC", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E095D139-28EE-4ADD-8FCD-3C2322AC3668", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5F5E8A3-6FB6-45B0-819A-95F88B6486DD", "versionEndExcluding": "7.0.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*", "matchCriteriaId": "F2DA3649-BC53-496E-A78C-FFA471872B5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B241F5FC-3053-44ED-ABDE-F7E4C1F26E2D", "versionEndExcluding": "1.0.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs110tup:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A469DFA-DE46-444C-B007-F9932C61EE26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs308t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5EF9D41-5E0D-4BBC-BD8C-40422B29D241", "versionEndExcluding": "1.0.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs308t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C204CFAA-0709-421A-A907-8F5B093063F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs310tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A18B9E4-16A6-443B-A504-784FA821B404", "versionEndExcluding": "1.0.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs310tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6761CCD9-9D27-465F-8707-F23707A84803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17CEF560-AF2A-48AD-B8A4-666BD2ECBDCE", "versionEndExcluding": "1.0.5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs710tup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F019BC-8BBB-40F4-A05C-172DCAC705C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E57F0167-9C61-44FB-A7BB-70F0A9247DB8", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9D88DD2-CE3F-431C-8FC8-01CBFB5AFED1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "421B0F3A-9A03-42B0-8B45-E77DFE176A6F", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB3B313-1667-401C-92CF-EBB03CF91010", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "339698F2-2727-469D-82E4-8E025FCBB106", "versionEndExcluding": "2.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EB10210-B401-4944-832A-D31AEA8B3952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7710FD29-3D79-4260-875D-48BBC8B173BE", "versionEndExcluding": "2.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "E871CCB4-8093-44AE-B289-CF81F82A9DB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51DB59CF-E8E6-4EE9-9E08-A50ED97250F5", "versionEndExcluding": "2.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4DE9FB-CAD5-45F9-A11C-1C20EE2FF3A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2C8E748-482C-4CF6-ACE0-21ABB3799CD4", "versionEndExcluding": "2.0.6.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "7126D4F8-2E3C-478B-9BD2-8055DFB48D8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs750e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDFC5B41-EBAC-42C9-B12E-AAACC199F324", "versionEndExcluding": "1.0.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs750e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A56285CF-1BD8-4BB5-AC9C-9EDDFCFC9E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00504A9F-EBE8-4D88-98C6-52CC260EC944", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "995D8E9F-7AE6-4A17-A728-7190FB2CE8BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F7E762-95AB-4E8F-865C-C29A6B41DC4F", "versionEndExcluding": "6.0.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "CDD4D404-9A22-408B-89CF-5107B809CB90", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D620D42-9365-4A5E-957C-ADB9EAD56D8C", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CF12A57-ACFA-48AA-B41C-06EB7095C800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD52B5A4-0CF4-4E80-BD9B-05C1DFB855D2", "versionEndExcluding": "1.0.4.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3A918F0-36BB-4EDE-98B8-00C3DC8F7BB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR smart switches are affected by a \\n injection in the web UI\u0027s password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the \"2\" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." }, { "lang": "es", "value": "Determinados smart switches de NETGEAR est\u00e1n afectados por una inyecci\u00f3n de \\n en el campo de la contrase\u00f1a de la Interfaz de Usuario Web, que - debido a varios aspectos defectuosos del esquema de autenticaci\u00f3n - permite al atacante crear (o sobrescribir) un archivo con contenido espec\u00edfico (por ejemplo, la cadena \"2\"). Esto conlleva a que un atacante no autenticado dise\u00f1e una sesi\u00f3n de administrador y, por lo tanto, alcance todos los privilegios de administrador de la interfaz web. Esto afecta a GC108P versiones anteriores a 1.0.8.2, GC108PP versiones anteriores a 1.0.8.2, GS108Tv3 versiones anteriores a 7.0.7.2, GS110TPP versiones anteriores a 7.0.7.2, GS110TPv3 versiones anteriores a 7. 0.7.2, GS110TUP versiones anteriores a 1.0.5.3, GS308T versiones anteriores a 1.0.3.2, GS310TP versiones anteriores a 1.0.3.2, GS710TUP versiones anteriores a 1.0.5.3, GS716TP versiones anteriores a 1.0.4. 2, GS716TPP versiones anteriores a 1.0.4.2, GS724TPP versiones anteriores a 2.0.6.3, GS724TPv2 versiones anteriores a 2.0.6.3, GS728TPPv2 versiones anteriores a 6.0.8.2, GS728TPv2 versiones anteriores a 6.0.8. 2, GS750E versiones anteriores a 1.0.1.10, GS752TPP versiones anteriores a 6.0.8.2, GS752TPv2 versiones anteriores a 6.0.8.2, MS510TXM versiones anteriores a 1.0.4.2 y MS510TXUP versiones anteriores a 1.0.4.2" } ], "id": "CVE-2021-41314", "lastModified": "2024-11-21T06:26:02.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-16T22:15:08.257", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gynvael.coldwind.pl/?id=742" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gynvael.coldwind.pl/?id=742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2017-18860
Vulnerability from cvelistv5
Published
2020-04-29 13:38
Modified
2024-08-05 21:37
Severity ?
EPSS score ?
Summary
Certain NETGEAR devices are affected by debugging command execution. This affects FS752TP 5.4.2.19 and earlier, GS108Tv2 5.4.2.29 and earlier, GS110TP 5.4.2.29 and earlier, GS418TPP 6.6.2.6 and earlier, GS510TLP 6.6.2.6 and earlier, GS510TP 5.04.2.27 and earlier, GS510TPP 6.6.2.6 and earlier, GS716Tv2 5.4.2.27 and earlier, GS716Tv3 6.3.1.16 and earlier, GS724Tv3 5.4.2.27 and earlier, GS724Tv4 6.3.1.16 and earlier, GS728TPSB 5.3.0.29 and earlier, GS728TSB 5.3.0.29 and earlier, GS728TXS 6.1.0.35 and earlier, GS748Tv4 5.4.2.27 and earlier, GS748Tv5 6.3.1.16 and earlier, GS752TPSB 5.3.0.29 and earlier, GS752TSB 5.3.0.29 and earlier, GS752TXS 6.1.0.35 and earlier, M4200 12.0.2.10 and earlier, M4300 12.0.2.10 and earlier, M5300 11.0.0.28 and earlier, M6100 11.0.0.28 and earlier, M7100 11.0.0.28 and earlier, S3300 6.6.1.4 and earlier, XS708T 6.6.0.11 and earlier, XS712T 6.1.0.34 and earlier, and XS716T 6.6.0.11 and earlier.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:37:44.297Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000038519/Security-Advisory-for-Authentication-Bypass-and-Remote-Command-Execution-on-Some-Smart-and-Managed-Switches-PSV-2017-0857" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by debugging command execution. This affects FS752TP 5.4.2.19 and earlier, GS108Tv2 5.4.2.29 and earlier, GS110TP 5.4.2.29 and earlier, GS418TPP 6.6.2.6 and earlier, GS510TLP 6.6.2.6 and earlier, GS510TP 5.04.2.27 and earlier, GS510TPP 6.6.2.6 and earlier, GS716Tv2 5.4.2.27 and earlier, GS716Tv3 6.3.1.16 and earlier, GS724Tv3 5.4.2.27 and earlier, GS724Tv4 6.3.1.16 and earlier, GS728TPSB 5.3.0.29 and earlier, GS728TSB 5.3.0.29 and earlier, GS728TXS 6.1.0.35 and earlier, GS748Tv4 5.4.2.27 and earlier, GS748Tv5 6.3.1.16 and earlier, GS752TPSB 5.3.0.29 and earlier, GS752TSB 5.3.0.29 and earlier, GS752TXS 6.1.0.35 and earlier, M4200 12.0.2.10 and earlier, M4300 12.0.2.10 and earlier, M5300 11.0.0.28 and earlier, M6100 11.0.0.28 and earlier, M7100 11.0.0.28 and earlier, S3300 6.6.1.4 and earlier, XS708T 6.6.0.11 and earlier, XS712T 6.1.0.34 and earlier, and XS716T 6.6.0.11 and earlier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-29T13:38:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000038519/Security-Advisory-for-Authentication-Bypass-and-Remote-Command-Execution-on-Some-Smart-and-Managed-Switches-PSV-2017-0857" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18860", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by debugging command execution. This affects FS752TP 5.4.2.19 and earlier, GS108Tv2 5.4.2.29 and earlier, GS110TP 5.4.2.29 and earlier, GS418TPP 6.6.2.6 and earlier, GS510TLP 6.6.2.6 and earlier, GS510TP 5.04.2.27 and earlier, GS510TPP 6.6.2.6 and earlier, GS716Tv2 5.4.2.27 and earlier, GS716Tv3 6.3.1.16 and earlier, GS724Tv3 5.4.2.27 and earlier, GS724Tv4 6.3.1.16 and earlier, GS728TPSB 5.3.0.29 and earlier, GS728TSB 5.3.0.29 and earlier, GS728TXS 6.1.0.35 and earlier, GS748Tv4 5.4.2.27 and earlier, GS748Tv5 6.3.1.16 and earlier, GS752TPSB 5.3.0.29 and earlier, GS752TSB 5.3.0.29 and earlier, GS752TXS 6.1.0.35 and earlier, M4200 12.0.2.10 and earlier, M4300 12.0.2.10 and earlier, M5300 11.0.0.28 and earlier, M6100 11.0.0.28 and earlier, M7100 11.0.0.28 and earlier, S3300 6.6.1.4 and earlier, XS708T 6.6.0.11 and earlier, XS712T 6.1.0.34 and earlier, and XS716T 6.6.0.11 and earlier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000038519/Security-Advisory-for-Authentication-Bypass-and-Remote-Command-Execution-on-Some-Smart-and-Managed-Switches-PSV-2017-0857", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000038519/Security-Advisory-for-Authentication-Bypass-and-Remote-Command-Execution-on-Some-Smart-and-Managed-Switches-PSV-2017-0857" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18860", "datePublished": "2020-04-29T13:38:19", "dateReserved": "2020-04-27T00:00:00", "dateUpdated": "2024-08-05T21:37:44.297Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40866
Vulnerability from cvelistv5
Published
2021-09-13 07:16
Modified
2024-08-04 02:51
Severity ?
EPSS score ?
Summary
Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:07.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gynvael.coldwind.pl/?id=740" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-13T07:16:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gynvael.coldwind.pl/?id=740" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-40866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gynvael.coldwind.pl/?id=740", "refsource": "MISC", "url": "https://gynvael.coldwind.pl/?id=740" }, { "name": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145", "refsource": "MISC", "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-40866", "datePublished": "2021-09-13T07:16:58", "dateReserved": "2021-09-13T00:00:00", "dateUpdated": "2024-08-04T02:51:07.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45677
Vulnerability from cvelistv5
Published
2021-12-26 00:23
Modified
2024-08-04 04:47
Severity ?
EPSS score ?
Summary
Certain NETGEAR devices are affected by stored XSS. This affects GS108Tv2 before 5.4.2.36 and GS110TPv2 before 5.4.2.36.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:47:01.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.netgear.com/000064448/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Smart-Managed-Pro-Switches-PSV-2019-0191" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by stored XSS. This affects GS108Tv2 before 5.4.2.36 and GS110TPv2 before 5.4.2.36." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AC:L/AV:A/A:N/C:L/I:L/PR:N/S:C/UI:R", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-26T00:23:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.netgear.com/000064448/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Smart-Managed-Pro-Switches-PSV-2019-0191" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by stored XSS. This affects GS108Tv2 before 5.4.2.36 and GS110TPv2 before 5.4.2.36." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "NONE", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AC:L/AV:A/A:N/C:L/I:L/PR:N/S:C/UI:R", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000064448/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Smart-Managed-Pro-Switches-PSV-2019-0191", "refsource": "MISC", "url": "https://kb.netgear.com/000064448/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Smart-Managed-Pro-Switches-PSV-2019-0191" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45677", "datePublished": "2021-12-26T00:23:11", "dateReserved": "2021-12-25T00:00:00", "dateUpdated": "2024-08-04T04:47:01.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40867
Vulnerability from cvelistv5
Published
2021-09-13 07:17
Modified
2024-08-04 02:51
Severity ?
EPSS score ?
Summary
Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:07.765Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gynvael.coldwind.pl/?id=741" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin\u0027s machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:U/UI:R", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-13T07:17:31", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gynvael.coldwind.pl/?id=741" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-40867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin\u0027s machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:U/UI:R", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145", "refsource": "MISC", "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "name": "https://gynvael.coldwind.pl/?id=741", "refsource": "MISC", "url": "https://gynvael.coldwind.pl/?id=741" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-40867", "datePublished": "2021-09-13T07:17:31", "dateReserved": "2021-09-13T00:00:00", "dateUpdated": "2024-08-04T02:51:07.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41314
Vulnerability from cvelistv5
Published
2021-09-16 22:00
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gynvael.coldwind.pl/?id=742" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR smart switches are affected by a \\n injection in the web UI\u0027s password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the \"2\" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-16T22:00:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gynvael.coldwind.pl/?id=742" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41314", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR smart switches are affected by a \\n injection in the web UI\u0027s password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the \"2\" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145", "refsource": "MISC", "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145" }, { "name": "https://gynvael.coldwind.pl/?id=742", "refsource": "MISC", "url": "https://gynvael.coldwind.pl/?id=742" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41314", "datePublished": "2021-09-16T22:00:37", "dateReserved": "2021-09-16T00:00:00", "dateUpdated": "2024-08-04T03:08:31.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33514
Vulnerability from cvelistv5
Published
2021-05-21 22:10
Modified
2024-08-03 23:50
Severity ?
EPSS score ?
Summary
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:42.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gynvael.coldwind.pl/?lang=en\u0026id=733" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=\u0027;$HTTP_USER_AGENT;\u0027 with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:U/UI:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-21T22:10:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gynvael.coldwind.pl/?lang=en\u0026id=733" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=\u0027;$HTTP_USER_AGENT;\u0027 with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:U/UI:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071", "refsource": "MISC", "url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071" }, { "name": "https://gynvael.coldwind.pl/?lang=en\u0026id=733", "refsource": "MISC", "url": "https://gynvael.coldwind.pl/?lang=en\u0026id=733" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33514", "datePublished": "2021-05-21T22:10:04", "dateReserved": "2021-05-21T00:00:00", "dateUpdated": "2024-08-03T23:50:42.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }