ID

VAR-201906-0193


CVE

CVE-2019-5017


TITLE

KCodes NetUSB.ko Kernel modules and NETGEAR Nighthawk Information disclosure vulnerability in routers

Trust: 0.8

sources: JVNDB: JVNDB-2019-005655

DESCRIPTION

An exploitable information disclosure vulnerability exists in the KCodes NetUSB.ko kernel module that enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. An unauthenticated, remote attacker can craft and send a packet containing an opcode that will trigger the kernel module to return several addresses. One of which can be used to calculate the dynamic base address of the module for further exploitation. The NETGEARNighthawk AC3200 is a tri-band wireless router from NETGEAR. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. KCodes NetUSB is prone to an information-disclosure vulnerability. KCodes NetUSB.ko versions 1.0.2.66 and 1.0.2.69 are vulnerable; other versions may also be affected. KCodes NetUSB.ko is a Linux kernel module that provides USB services through IP provided by Taiwan KCodes Company

Trust: 2.52

sources: NVD: CVE-2019-5017 // JVNDB: JVNDB-2019-005655 // CNVD: CNVD-2019-18873 // BID: 108827 // VULHUB: VHN-156452

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-18873

AFFECTED PRODUCTS

vendor:kcodesmodel:netusb.koscope:eqversion:1.0.2.66

Trust: 1.3

vendor:netgearmodel:r8000scope:eqversion:1.0.4.28_10.1.54

Trust: 1.0

vendor:kcodesmodel:netusbscope: - version: -

Trust: 0.8

vendor:net gearmodel:r8000scope: - version: -

Trust: 0.8

vendor:netgearmodel:netusb.koscope:eqversion:1.0.2.66

Trust: 0.6

vendor:netgearmodel:ac3200 nighthawkscope:eqversion:1.0.4.2810.1.54

Trust: 0.3

vendor:netgearmodel:ac3000 nighthawkscope:eqversion:1.0.3.810.0.37

Trust: 0.3

vendor:kcodesmodel:netusb.koscope:eqversion:1.0.2.69

Trust: 0.3

sources: CNVD: CNVD-2019-18873 // BID: 108827 // JVNDB: JVNDB-2019-005655 // NVD: CVE-2019-5017

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-5017
value: MEDIUM

Trust: 1.0

talos-cna@cisco.com: CVE-2019-5017
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-5017
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-18873
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201906-666
value: MEDIUM

Trust: 0.6

VULHUB: VHN-156452
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-5017
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-18873
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-156452
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-5017
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2019-5017
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

NVD: CVE-2019-5017
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-18873 // VULHUB: VHN-156452 // JVNDB: JVNDB-2019-005655 // CNNVD: CNNVD-201906-666 // NVD: CVE-2019-5017 // NVD: CVE-2019-5017

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-156452 // JVNDB: JVNDB-2019-005655 // NVD: CVE-2019-5017

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-666

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201906-666

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-005655

PATCH

title:NetUSB (USB over IP)url:https://www.kcodes.com/product/1/36

Trust: 0.8

title:Model: R8000url:https://www.netgear.com/home/products/networking/wifi-routers/R8000.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2019-005655

EXTERNAL IDS

db:NVDid:CVE-2019-5017

Trust: 3.4

db:TALOSid:TALOS-2019-0776

Trust: 2.8

db:BIDid:108827

Trust: 2.0

db:JVNDBid:JVNDB-2019-005655

Trust: 0.8

db:CNNVDid:CNNVD-201906-666

Trust: 0.7

db:CNVDid:CNVD-2019-18873

Trust: 0.6

db:VULHUBid:VHN-156452

Trust: 0.1

sources: CNVD: CNVD-2019-18873 // VULHUB: VHN-156452 // BID: 108827 // JVNDB: JVNDB-2019-005655 // CNNVD: CNNVD-201906-666 // NVD: CVE-2019-5017

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2019-0776

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-5017

Trust: 2.0

url:http://www.securityfocus.com/bid/108827

Trust: 1.7

url:http://www.netgear.com/

Trust: 0.9

url:https://www.kcodes.com/

Trust: 0.9

url:https://www.talosintelligence.com/vulnerability_reports/talos-2019-0776

Trust: 0.9

url:https://kb.netgear.com/000061024/security-advisory-for-kcodes-netusb-unauthenticated-remote-kernel-vulnerabilities-on-r7900-and-r8000-routers-psv-2019-0029

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5017

Trust: 0.8

sources: CNVD: CNVD-2019-18873 // VULHUB: VHN-156452 // BID: 108827 // JVNDB: JVNDB-2019-005655 // CNNVD: CNNVD-201906-666 // NVD: CVE-2019-5017

CREDITS

Dave McDaniel of Cisco Talos.

Trust: 0.9

sources: BID: 108827 // CNNVD: CNNVD-201906-666

SOURCES

db:CNVDid:CNVD-2019-18873
db:VULHUBid:VHN-156452
db:BIDid:108827
db:JVNDBid:JVNDB-2019-005655
db:CNNVDid:CNNVD-201906-666
db:NVDid:CVE-2019-5017

LAST UPDATE DATE

2024-11-23T21:37:15.216000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-18873date:2019-06-23T00:00:00
db:VULHUBid:VHN-156452date:2019-06-21T00:00:00
db:BIDid:108827date:2019-06-17T00:00:00
db:JVNDBid:JVNDB-2019-005655date:2019-06-25T00:00:00
db:CNNVDid:CNNVD-201906-666date:2019-07-09T00:00:00
db:NVDid:CVE-2019-5017date:2024-11-21T04:44:11.707

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-18873date:2019-06-20T00:00:00
db:VULHUBid:VHN-156452date:2019-06-17T00:00:00
db:BIDid:108827date:2019-06-17T00:00:00
db:JVNDBid:JVNDB-2019-005655date:2019-06-25T00:00:00
db:CNNVDid:CNNVD-201906-666date:2019-06-17T00:00:00
db:NVDid:CVE-2019-5017date:2019-06-17T21:15:09.877