ID

VAR-202004-0479


CVE

CVE-2020-11770


TITLE

plural NETGEAR Injection vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2020-004303

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7000v2 before 1.0.0.53, D8500 before 1.0.3.44, R6220 before 1.1.0.80, R6250 before 1.0.4.34, R6260 before 1.1.0.64, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6700v3 before 1.0.2.66, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7800 before 1.0.2.60, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.32. plural NETGEAR A device contains an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2020-11770 // JVNDB: JVNDB-2020-004303

AFFECTED PRODUCTS

vendor:netgearmodel:r6400scope:ltversion:1.0.2.66

Trust: 1.0

vendor:netgearmodel:d7000scope:ltversion:1.0.0.53

Trust: 1.0

vendor:netgearmodel:d8500scope:ltversion:1.0.3.44

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.52

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.86

Trust: 1.0

vendor:netgearmodel:r9000scope:ltversion:1.0.4.12

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.0.2.66

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.1.64

Trust: 1.0

vendor:netgearmodel:r7300dstscope:ltversion:1.0.0.70

Trust: 1.0

vendor:netgearmodel:r6220scope:ltversion:1.1.0.80

Trust: 1.0

vendor:netgearmodel:r8300scope:ltversion:1.0.2.128

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.1.30

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:r7800scope:ltversion:1.0.2.60

Trust: 1.0

vendor:netgearmodel:r6260scope:ltversion:1.1.0.64

Trust: 1.0

vendor:netgearmodel:r6800scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:r6250scope:ltversion:1.0.4.34

Trust: 1.0

vendor:netgearmodel:r7900scope:ltversion:1.0.3.8

Trust: 1.0

vendor:netgearmodel:r8900scope:ltversion:1.0.4.12

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.46

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.1.64

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.50

Trust: 1.0

vendor:netgearmodel:xr500scope:ltversion:2.3.2.32

Trust: 1.0

vendor:netgearmodel:r8500scope:ltversion:1.0.2.128

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.28

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.1.30

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.9.42

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.0.2.6

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.0.2.4

Trust: 1.0

vendor:netgearmodel:d6220scope:eqversion:1.0.0.52

Trust: 0.8

vendor:netgearmodel:d6400scope:eqversion:1.0.0.86

Trust: 0.8

vendor:netgearmodel:d8500scope:eqversion:1.0.3.44

Trust: 0.8

vendor:netgearmodel:r6220scope:eqversion:1.1.0.80

Trust: 0.8

vendor:netgearmodel:r6250scope:eqversion:1.0.4.34

Trust: 0.8

vendor:netgearmodel:r6260scope:eqversion:1.1.0.64

Trust: 0.8

vendor:netgearmodel:r6400scope:eqversion:1.0.1.46

Trust: 0.8

vendor:netgearmodel:r6700scope:eqversion:1.0.2.6

Trust: 0.8

vendor:netgearmodel:r6800scope:eqversion:1.2.0.36

Trust: 0.8

vendor:netgearmodel:r6900scope:eqversion:1.0.2.4

Trust: 0.8

sources: JVNDB: JVNDB-2020-004303 // NVD: CVE-2020-11770

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-11770
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2020-11770
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-004303
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202004-1179
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-11770
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-004303
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2020-11770
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2020-11770
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-004303
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-004303 // CNNVD: CNNVD-202004-1179 // NVD: CVE-2020-11770 // NVD: CVE-2020-11770

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:CWE-74

Trust: 0.8

sources: JVNDB: JVNDB-2020-004303 // NVD: CVE-2020-11770

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-1179

TYPE

injection

Trust: 0.6

sources: CNNVD: CNNVD-202004-1179

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004303

PATCH

title:Security Advisory for Post-Authentication Command Injection on Some Routers and Gateways, PSV-2018-0352url:https://kb.netgear.com/000061760/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2018-0352

Trust: 0.8

title:Multiple NETGEAR Fixing measures for product injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116493

Trust: 0.6

sources: JVNDB: JVNDB-2020-004303 // CNNVD: CNNVD-202004-1179

EXTERNAL IDS

db:NVDid:CVE-2020-11770

Trust: 2.4

db:JVNDBid:JVNDB-2020-004303

Trust: 0.8

db:CNNVDid:CNNVD-202004-1179

Trust: 0.6

sources: JVNDB: JVNDB-2020-004303 // CNNVD: CNNVD-202004-1179 // NVD: CVE-2020-11770

REFERENCES

url:https://kb.netgear.com/000061760/security-advisory-for-post-authentication-command-injection-on-some-routers-and-gateways-psv-2018-0352

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-11770

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-11770

Trust: 0.8

sources: JVNDB: JVNDB-2020-004303 // CNNVD: CNNVD-202004-1179 // NVD: CVE-2020-11770

SOURCES

db:JVNDBid:JVNDB-2020-004303
db:CNNVDid:CNNVD-202004-1179
db:NVDid:CVE-2020-11770

LAST UPDATE DATE

2024-11-23T23:11:27.834000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-004303date:2020-05-12T00:00:00
db:CNNVDid:CNNVD-202004-1179date:2020-04-26T00:00:00
db:NVDid:CVE-2020-11770date:2024-11-21T04:58:34.790

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-004303date:2020-05-12T00:00:00
db:CNNVDid:CNNVD-202004-1179date:2020-04-15T00:00:00
db:NVDid:CVE-2020-11770date:2020-04-15T14:15:20.530