var-202004-0941
Vulnerability from variot
Certain NETGEAR devices are affected by lack of access control at the function level. This affects FS728TLP before 1.0.1.26, GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS108Ev3 before 2.06.08, GS108PEv3 before 2.06.08, GS110EMX before 1.0.1.4, GS116Ev2 before 2.6.0.35, GS408EPP before 1.0.0.15, GS724TPv2 before 1.1.1.29, GS808E before 1.7.0.7, GS810EMX before 1.7.1.1, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15, GSS116E before 1.6.0.9, JGS516PE before 2.6.0.35, JGS524Ev2 before 2.6.0.35, JGS524PE before 2.6.0.35, XS512EM before 1.0.1.1, XS708Ev2 before 1.6.0.23, XS716E before 1.6.0.23, and XS724EM before 1.0.1.1. plural NETGEAR The device contains a vulnerability related to lack of authentication.Information may be obtained and tampered with. NETGEAR GS105E, etc. are all a kind of switchboard of NETGEAR. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-0941", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fs728tlp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.1.26" }, { "model": "gs105pe", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.6.0.4" }, { "model": "gs110emx", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.1.4" }, { "model": "gs408epp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.0.15" }, { "model": "gs808e", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.7.0.7" }, { "model": "gs810emx", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.7.1.1" }, { "model": "gs908e", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.7.0.3" }, { "model": "gss108e", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.6.0.4" }, { "model": "gss108epp", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.0.15" }, { "model": "gss116e", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.6.0.9" }, { "model": "jgs516pe", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.6.0.35" }, { "model": "jgs524pe", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "2.6.0.35" }, { "model": "xs512em", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.1.1" }, { "model": "xs716e", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.6.0.23" }, { "model": "xs724em", "scope": "lt", "trust": 1.6, "vendor": "netgear", "version": "1.0.1.1" }, { "model": "gs724tp", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "1.1.1.29" }, { "model": "gs116e", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.6.0.35" }, { "model": "gs108pe", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.06.08" }, { "model": "xs708e", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "1.6.0.23" }, { "model": "gs105e", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "1.6.0.4" }, { "model": "gs108e", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.06.08" }, { "model": "jgs524e", "scope": "lt", "trust": 1.0, "vendor": "netgear", "version": "2.6.0.35" }, { "model": "fs728tlp", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.0.1.26" }, { "model": "gs105e", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.6.0.4" }, { "model": "gs105pe prosafe plus switch", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.6.0.4" }, { "model": "gs108e", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.06.08" }, { "model": "gs108pe prosafe plus switch", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.06.08" }, { "model": "gs110emx", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.0.1.4" }, { "model": "gs116e", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "2.6.0.35" }, { "model": "gs408epp", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.0.0.15" }, { "model": "gs724tp", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.1.1.29" }, { "model": "gs808e", "scope": "eq", "trust": 0.8, "vendor": "netgear", "version": "1.7.0.7" }, { "model": "gs105ev2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "1.6.0.4" }, { "model": "gs108ev3", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "2.06.08" }, { "model": "gs108pev3", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "2.06.08" }, { "model": "gs116ev2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "2.6.0.35" }, { "model": "gs724tpv2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "1.1.1.29" }, { "model": "jgs524ev2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "2.6.0.35" }, { "model": "xs708ev2", "scope": "lt", "trust": 0.6, "vendor": "netgear", "version": "1.6.0.23" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-24418" }, { "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "db": "NVD", "id": "CVE-2019-20676" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:netgear:fs728tlp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs105e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs105pe_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs108e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs108pe_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs110emx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs116e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs408epp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs724tp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:netgear:gs808e_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-015469" } ] }, "cve": "CVE-2019-20676", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2019-20676", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2019-015469", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2020-24418", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-20676", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "cve@mitre.org", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2019-20676", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.0, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2019-015469", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-20676", "trust": 1.0, "value": "MEDIUM" }, { "author": "cve@mitre.org", "id": "CVE-2019-20676", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2019-015469", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-24418", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202004-1210", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-24418" }, { "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "db": "CNNVD", "id": "CNNVD-202004-1210" }, { "db": "NVD", "id": "CVE-2019-20676" }, { "db": "NVD", "id": "CVE-2019-20676" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Certain NETGEAR devices are affected by lack of access control at the function level. This affects FS728TLP before 1.0.1.26, GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS108Ev3 before 2.06.08, GS108PEv3 before 2.06.08, GS110EMX before 1.0.1.4, GS116Ev2 before 2.6.0.35, GS408EPP before 1.0.0.15, GS724TPv2 before 1.1.1.29, GS808E before 1.7.0.7, GS810EMX before 1.7.1.1, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15, GSS116E before 1.6.0.9, JGS516PE before 2.6.0.35, JGS524Ev2 before 2.6.0.35, JGS524PE before 2.6.0.35, XS512EM before 1.0.1.1, XS708Ev2 before 1.6.0.23, XS716E before 1.6.0.23, and XS724EM before 1.0.1.1. plural NETGEAR The device contains a vulnerability related to lack of authentication.Information may be obtained and tampered with. NETGEAR GS105E, etc. are all a kind of switchboard of NETGEAR. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2019-20676" }, { "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "db": "CNVD", "id": "CNVD-2020-24418" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-20676", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-015469", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-24418", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-1210", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-24418" }, { "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "db": "CNNVD", "id": "CNNVD-202004-1210" }, { "db": "NVD", "id": "CVE-2019-20676" } ] }, "id": "VAR-202004-0941", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-24418" } ], "trust": 1.3507586008695651 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-24418" } ] }, "last_update_date": "2024-11-23T23:11:27.368000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Advisory for Missing Function Level Access Control on Some Switches, PSV-2018-0542", "trust": 0.8, "url": "https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542" }, { "title": "Patch for Multiple NETGEAR product access control error vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/215173" }, { "title": "Multiple NETGEAR Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116089" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-24418" }, { "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "db": "CNNVD", "id": "CNNVD-202004-1210" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-862", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "db": "NVD", "id": "CVE-2019-20676" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20676" }, { "trust": 1.6, "url": "https://kb.netgear.com/000061463/security-advisory-for-missing-function-level-access-control-on-some-switches-psv-2018-0542" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-20676" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-24418" }, { "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "db": "CNNVD", "id": "CNNVD-202004-1210" }, { "db": "NVD", "id": "CVE-2019-20676" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-24418" }, { "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "db": "CNNVD", "id": "CNNVD-202004-1210" }, { "db": "NVD", "id": "CVE-2019-20676" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-24T00:00:00", "db": "CNVD", "id": "CNVD-2020-24418" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "date": "2020-04-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1210" }, { "date": "2020-04-15T20:15:14.333000", "db": "NVD", "id": "CVE-2019-20676" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-24T00:00:00", "db": "CNVD", "id": "CNVD-2020-24418" }, { "date": "2020-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-015469" }, { "date": "2020-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1210" }, { "date": "2024-11-21T04:39:03.200000", "db": "NVD", "id": "CVE-2019-20676" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NETGEAR Vulnerability in lack of authentication on device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-015469" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1210" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.