fkie_cve-2017-18862
Vulnerability from fkie_nvd
Published
2020-04-28 16:15
Modified
2024-11-21 03:21
Severity ?
Summary
Certain NETGEAR devices are affected by authentication bypass. This affects JGS516PE before 2017-05-11, JGS524Ev2 before 2017-05-11, JGS524PE before 2017-05-11, GS105Ev2 before 2017-05-11, GS105PE before 2017-05-11, GS108Ev3 before 2017-05-11, GS108PEv3 before 2017-05-11, GS116Ev2 before 2017-05-11, GSS108E before 2017-05-11, GSS116E before 2017-05-11, XS708Ev2 before 2017-05-11, and XS716E before 2017-05-11.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netgear | jgs516pe_firmware | * | |
netgear | jgs516pe | - | |
netgear | jgs524e_firmware | * | |
netgear | jgs524e | v2 | |
netgear | jgs524pe_firmware | * | |
netgear | jgs524pe | - | |
netgear | gs105e_firmware | * | |
netgear | gs105e | v2 | |
netgear | gs105pe_firmware | * | |
netgear | gs105pe | - | |
netgear | gs108e_firmware | * | |
netgear | gs108e | v3 | |
netgear | gs108pe_firmware | * | |
netgear | gs108pe | v3 | |
netgear | gs116e_firmware | * | |
netgear | gs116e | v2 | |
netgear | gss108e_firmware | * | |
netgear | gss108e | - | |
netgear | gss116e_firmware | * | |
netgear | gss116e | - | |
netgear | xs708e_firmware | * | |
netgear | xs708e | v2 | |
netgear | xs716e_firmware | * | |
netgear | xs716e | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49892DB9-4B99-46FC-A353-C5AEAF93918F", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:jgs516pe:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCBC0DAB-226E-4C95-9818-7758D37EFD10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:jgs524e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F28D3423-ABA9-47A4-AE74-75019D649BA8", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:jgs524e:v2:*:*:*:*:*:*:*", "matchCriteriaId": "CFF899BD-AA1E-4C47-BCFD-5E32F75F538A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:jgs524pe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0774BAE9-FF47-4785-9AA0-86A594335FBA", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:jgs524pe:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4A32288-19B5-4A8F-B883-FCC326B7032D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs105e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "187CA489-3136-4889-AB0F-3ADA5C7D9C89", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs105e:v2:*:*:*:*:*:*:*", "matchCriteriaId": "DD993BAB-DF89-41AB-936B-9C6F280BAE1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs105pe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "288AED3B-8007-4650-9CB2-3342A345533C", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs105pe:-:*:*:*:*:*:*:*", "matchCriteriaId": "211D1DBE-5D7A-4309-A125-126AF2A16647", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs108e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A85C689-1FBB-4799-9C27-34C7F6D0CA0A", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs108e:v3:*:*:*:*:*:*:*", "matchCriteriaId": "5579C6E3-866F-4E6A-BD4C-0A1239DE5699", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs108pe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6812FA4-1665-4CB5-9C89-DBC58557A742", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs108pe:v3:*:*:*:*:*:*:*", "matchCriteriaId": "3DA97C4B-C592-4418-8F3B-24C891D3C830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gs116e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CE2876A-58F5-4892-89DD-E674A3DE96F1", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gs116e:v2:*:*:*:*:*:*:*", "matchCriteriaId": "6DA5EF92-9B28-4C81-8A95-C5BCEC19591A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gss108e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48100EBE-BBE1-4278-8F71-A4A6F758B96A", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gss108e:-:*:*:*:*:*:*:*", "matchCriteriaId": "8244C4BA-F166-4C32-BF43-0964CD99921B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:gss116e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69553993-8804-48F4-B408-DDA852B048C8", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:gss116e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C7E2A39-F250-49EB-AE39-A1745B8F1569", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:xs708e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB82FC08-625B-496D-93EB-2673E0147832", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:xs708e:v2:*:*:*:*:*:*:*", "matchCriteriaId": "FD93BF51-A52C-422F-BB05-63CF9E97D3B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:xs716e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAB20EA0-D4CF-47D7-8152-45CD65B3FC65", "versionEndExcluding": "2017-05-11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netgear:xs716e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C6BBBDF-8E4C-42B3-9B23-C0970F5C4B7B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by authentication bypass. This affects JGS516PE before 2017-05-11, JGS524Ev2 before 2017-05-11, JGS524PE before 2017-05-11, GS105Ev2 before 2017-05-11, GS105PE before 2017-05-11, GS108Ev3 before 2017-05-11, GS108PEv3 before 2017-05-11, GS116Ev2 before 2017-05-11, GSS108E before 2017-05-11, GSS116E before 2017-05-11, XS708Ev2 before 2017-05-11, and XS716E before 2017-05-11." }, { "lang": "es", "value": "Determinados dispositivos de NETGEAR est\u00e1n afectados por una omisi\u00f3n de autenticaci\u00f3n. Esto afecta a JGS516PE antes del 11-05-2017, JGS524Ev2 antes del 11-05-2017, JGS524PE antes del 11-05-2017, GS105Ev2 antes del 11-05-2017, GS105PE antes del 11-05-2017, GS108Ev3 antes del 11-05-2017, GS108PEv3 antes del 11-05-2017, GS116Ev2 antes del 11-05-2017, GSS108E antes del 11-05-2017, GSS116E antes del 11-05-2017, XS708Ev2 antes del 11-05-2017, y XS716E antes del 11-05-2017." } ], "id": "CVE-2017-18862", "lastModified": "2024-11-21T03:21:07.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-28T16:15:12.683", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000037849/Security-Advisory-for-Authentication-Bypass-on-ProSAFE-Web-Managed-Switches-PSV-2015-0043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.netgear.com/000037849/Security-Advisory-for-Authentication-Bypass-on-ProSAFE-Web-Managed-Switches-PSV-2015-0043" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.