ID

VAR-201104-0211


CVE

CVE-2011-1674


TITLE

NetGear ProSafe WNAP210 Security Bypass Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2011-6459 // CNNVD: CNNVD-201104-073

DESCRIPTION

The NetGear ProSafe WNAP210 with firmware 2.0.12 allows remote attackers to bypass authentication and obtain access to the configuration page by visiting recreate.php and then visiting index.php. NetGear WNAP210 is vulnerable to remote administrator password disclosure and administrative web page login bypass. Netgear ProSafe Wireless Access Point (WNAP210) Has multiple vulnerabilities. Netgear Provided by WNAP210 Has two vulnerabilities. This configuration stores the administrator password in clear text. NETGEAR WNAP210 has a security bypass vulnerability in its implementation. WNAP210 firmware 2.0.12 is vulnerable; other versions may also be affected. ---------------------------------------------------------------------- Q1 Factsheets released: http://secunia.com/resources/factsheets/2011_vendor/ ---------------------------------------------------------------------- TITLE: NetGear WNAP210 Backup Disclosure and Authentication Bypass Vulnerabilities SECUNIA ADVISORY ID: SA44045 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44045/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44045 RELEASE DATE: 2011-04-06 DISCUSS ADVISORY: http://secunia.com/advisories/44045/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44045/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44045 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in Netgear ProSafe Wireless-N Access Point WNAP210, which can be exploited by malicious people to disclose sensitive information and bypass certain security restrictions. SOLUTION: Update to the latest firmware. Please contact the vendor for more details. PROVIDED AND/OR DISCOVERED BY: Trevor Seward via US-CERT. ORIGINAL ADVISORY: US-CERT VU#644812: http://www.kb.cert.org/vuls/id/644812 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 5.4

sources: NVD: CVE-2011-1674 // CERT/CC: VU#644812 // JVNDB: JVNDB-2011-004480 // JVNDB: JVNDB-2011-001453 // CNVD: CNVD-2011-1327 // CNVD: CNVD-2011-6459 // CNVD: CNVD-2011-1328 // BID: 47175 // BID: 78577 // VULHUB: VHN-49619 // PACKETSTORM: 100135

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2011-1327 // CNVD: CNVD-2011-1328

AFFECTED PRODUCTS

vendor:netgearmodel:prosafe wnap210scope:eqversion:2.0.12

Trust: 1.9

vendor:netgearmodel:wnap210scope:eqversion:2.0.12

Trust: 1.5

vendor:netgearmodel:prosafe wnap210scope:eqversion:*

Trust: 1.0

vendor:netgearmodel: - scope: - version: -

Trust: 0.8

vendor:net gearmodel:prosafe wnap210scope:eqversion:2.0.12

Trust: 0.8

vendor:net gearmodel:wnap210scope: - version: -

Trust: 0.8

vendor:net gearmodel:wnap210scope:eqversion:firmware version 2.0.12

Trust: 0.8

vendor:netgearmodel:prosafe wnap210scope: - version: -

Trust: 0.6

vendor:netgearmodel:prosafe wnap210scope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#644812 // CNVD: CNVD-2011-1327 // CNVD: CNVD-2011-6459 // CNVD: CNVD-2011-1328 // BID: 47175 // BID: 78577 // JVNDB: JVNDB-2011-004480 // JVNDB: JVNDB-2011-001453 // CNNVD: CNNVD-201104-073 // NVD: CVE-2011-1674

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-1674
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#644812
value: 5.10

Trust: 0.8

NVD: CVE-2011-1674
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2011-6459
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201104-073
value: MEDIUM

Trust: 0.6

VULHUB: VHN-49619
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-1674
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2011-6459
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-49619
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#644812 // CNVD: CNVD-2011-6459 // VULHUB: VHN-49619 // JVNDB: JVNDB-2011-004480 // CNNVD: CNNVD-201104-073 // NVD: CVE-2011-1674

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-49619 // JVNDB: JVNDB-2011-004480 // NVD: CVE-2011-1674

THREAT TYPE

network

Trust: 0.6

sources: BID: 47175 // BID: 78577

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201104-073

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-004480

PATCH

title:WNAP210url:http://www.netgear.com/business/products/access-points-wireless-controllers/access-points/wnap210.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2011-004480

EXTERNAL IDS

db:CERT/CCid:VU#644812

Trust: 5.4

db:NVDid:CVE-2011-1674

Trust: 3.4

db:BIDid:47175

Trust: 1.5

db:SECUNIAid:44045

Trust: 1.3

db:VUPENid:ADV-2011-0884

Trust: 1.1

db:JVNDBid:JVNDB-2011-004480

Trust: 0.8

db:JVNDBid:JVNDB-2011-001453

Trust: 0.8

db:CNNVDid:CNNVD-201104-073

Trust: 0.7

db:CNVDid:CNVD-2011-1327

Trust: 0.6

db:CNVDid:CNVD-2011-6459

Trust: 0.6

db:CNVDid:CNVD-2011-1328

Trust: 0.6

db:BIDid:78577

Trust: 0.4

db:XFid:66723

Trust: 0.3

db:VULHUBid:VHN-49619

Trust: 0.1

db:PACKETSTORMid:100135

Trust: 0.1

sources: CERT/CC: VU#644812 // CNVD: CNVD-2011-1327 // CNVD: CNVD-2011-6459 // CNVD: CNVD-2011-1328 // VULHUB: VHN-49619 // BID: 47175 // BID: 78577 // JVNDB: JVNDB-2011-004480 // JVNDB: JVNDB-2011-001453 // PACKETSTORM: 100135 // CNNVD: CNNVD-201104-073 // NVD: CVE-2011-1674

REFERENCES

url:http://www.kb.cert.org/vuls/id/644812

Trust: 4.0

url:http://support.netgear.com/app/answers/detail/a_id/19381

Trust: 1.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1674

Trust: 1.4

url:http://secunia.com/advisories/44045

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0884

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/66723

Trust: 1.1

url:http://www.netgear.com/products/business/access-points-wireless-controllers/access-points/wnap210.aspx

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1674

Trust: 0.8

url:http://jvn.jp/cert/jvnvu644812

Trust: 0.8

url:http://www.securityfocus.com/bid/47175/infohttp

Trust: 0.6

url:http://www.kb.cert.org/vuls/id/644812http

Trust: 0.6

url:http://www.netgear.com

Trust: 0.3

url:http://xforce.iss.net/xforce/xfdb/66723

Trust: 0.3

url:http://secunia.com/advisories/44045/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44045

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/44045/

Trust: 0.1

url:http://secunia.com/resources/factsheets/2011_vendor/

Trust: 0.1

sources: CERT/CC: VU#644812 // CNVD: CNVD-2011-1327 // CNVD: CNVD-2011-6459 // CNVD: CNVD-2011-1328 // VULHUB: VHN-49619 // BID: 47175 // BID: 78577 // JVNDB: JVNDB-2011-004480 // JVNDB: JVNDB-2011-001453 // PACKETSTORM: 100135 // CNNVD: CNNVD-201104-073 // NVD: CVE-2011-1674

CREDITS

Trevor Seward

Trust: 0.3

sources: BID: 47175

SOURCES

db:CERT/CCid:VU#644812
db:CNVDid:CNVD-2011-1327
db:CNVDid:CNVD-2011-6459
db:CNVDid:CNVD-2011-1328
db:VULHUBid:VHN-49619
db:BIDid:47175
db:BIDid:78577
db:JVNDBid:JVNDB-2011-004480
db:JVNDBid:JVNDB-2011-001453
db:PACKETSTORMid:100135
db:CNNVDid:CNNVD-201104-073
db:NVDid:CVE-2011-1674

LAST UPDATE DATE

2024-11-23T22:02:53.052000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#644812date:2011-09-02T00:00:00
db:CNVDid:CNVD-2011-1327date:2011-04-06T00:00:00
db:CNVDid:CNVD-2011-6459date:2011-04-13T00:00:00
db:CNVDid:CNVD-2011-1328date:2011-04-06T00:00:00
db:VULHUBid:VHN-49619date:2017-08-17T00:00:00
db:BIDid:47175date:2011-04-05T00:00:00
db:BIDid:78577date:2011-04-09T00:00:00
db:JVNDBid:JVNDB-2011-004480date:2012-03-27T00:00:00
db:JVNDBid:JVNDB-2011-001453date:2011-04-28T00:00:00
db:CNNVDid:CNNVD-201104-073date:2011-04-14T00:00:00
db:NVDid:CVE-2011-1674date:2024-11-21T01:26:46.417

SOURCES RELEASE DATE

db:CERT/CCid:VU#644812date:2011-04-05T00:00:00
db:CNVDid:CNVD-2011-1327date:2011-04-06T00:00:00
db:CNVDid:CNVD-2011-6459date:2011-04-13T00:00:00
db:CNVDid:CNVD-2011-1328date:2011-04-06T00:00:00
db:VULHUBid:VHN-49619date:2011-04-10T00:00:00
db:BIDid:47175date:2011-04-05T00:00:00
db:BIDid:78577date:2011-04-09T00:00:00
db:JVNDBid:JVNDB-2011-004480date:2012-03-27T00:00:00
db:JVNDBid:JVNDB-2011-001453date:2011-04-28T00:00:00
db:PACKETSTORMid:100135date:2011-04-06T11:55:42
db:CNNVDid:CNNVD-201104-073date:2011-04-13T00:00:00
db:NVDid:CVE-2011-1674date:2011-04-10T02:55:01.790