ID

VAR-202004-0897


CVE

CVE-2019-20657


TITLE

plural NETGEAR Classic buffer overflow vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2019-015440

DESCRIPTION

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6200 before 1.1.00.36, D7000 before 1.0.1.74, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.24, JR6150 before 1.0.1.24, R6120 before 1.0.0.48, R6220 before 1.1.0.86, R6230 before 1.1.0.86, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, and WNR2020 before 1.1.0.62. plural NETGEAR A classic buffer overflow vulnerability exists on the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR D6200, etc. are all products of NETGEAR. NETGEAR D6200 is a wireless modem. NETGEAR WNR2020 is a wireless router. NETGEAR PR2000 is a wireless router. The vulnerability stems from the fact that the network system or product performs an operation on the memory, and the data boundary is not correctly verified, resulting in an incorrect read and write operation to other associated memory locations. Attack You can use this vulnerability to cause buffer overflow or heap overflow

Trust: 2.16

sources: NVD: CVE-2019-20657 // JVNDB: JVNDB-2019-015440 // CNVD: CNVD-2020-27208

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-27208

AFFECTED PRODUCTS

vendor:netgearmodel:pr2000scope:ltversion:1.0.0.28

Trust: 1.6

vendor:netgearmodel:r6260scope:ltversion:1.1.0.64

Trust: 1.6

vendor:netgearmodel:wnr2020scope:ltversion:1.1.0.62

Trust: 1.6

vendor:netgearmodel:d6200scope:ltversion:1.1.00.36

Trust: 1.6

vendor:netgearmodel:d7000scope:ltversion:1.0.1.74

Trust: 1.6

vendor:netgearmodel:r6020scope:ltversion:1.0.0.42

Trust: 1.6

vendor:netgearmodel:r6080scope:ltversion:1.0.0.42

Trust: 1.6

vendor:netgearmodel:r6050scope:ltversion:1.0.1.24

Trust: 1.6

vendor:netgearmodel:jr6150scope:ltversion:1.0.1.24

Trust: 1.6

vendor:netgearmodel:r6120scope:ltversion:1.0.0.48

Trust: 1.6

vendor:netgearmodel:r6220scope:ltversion:1.1.0.86

Trust: 1.6

vendor:netgearmodel:r6230scope:ltversion:1.1.0.86

Trust: 1.6

vendor:netgearmodel:r6800scope:ltversion:1.2.0.62

Trust: 1.6

vendor:netgearmodel:r6700scope:ltversion:1.2.0.62

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.2.0.62

Trust: 1.0

vendor:netgearmodel:d6200scope:eqversion:1.1.00.36

Trust: 0.8

vendor:netgearmodel:d7000scope:eqversion:1.0.1.74

Trust: 0.8

vendor:netgearmodel:jr6150scope:eqversion:1.0.0.24

Trust: 0.8

vendor:netgearmodel:pr2000scope:eqversion:1.0.0.28

Trust: 0.8

vendor:netgearmodel:r6020scope:eqversion:1.0.0.42

Trust: 0.8

vendor:netgearmodel:r6050scope:eqversion:1.0.0.24

Trust: 0.8

vendor:netgearmodel:r6080scope:eqversion:1.0.0.42

Trust: 0.8

vendor:netgearmodel:r6120scope:eqversion:1.0.0.48

Trust: 0.8

vendor:netgearmodel:r6220scope:eqversion:1.1.0.86

Trust: 0.8

vendor:netgearmodel:r6230scope:eqversion:1.1.0.86

Trust: 0.8

vendor:netgearmodel:r6700v2scope:ltversion:1.2.0.62

Trust: 0.6

vendor:netgearmodel:r6900v2scope:ltversion:1.2.0.62

Trust: 0.6

sources: CNVD: CNVD-2020-27208 // JVNDB: JVNDB-2019-015440 // NVD: CVE-2019-20657

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-20657
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2019-20657
value: HIGH

Trust: 1.0

NVD: JVNDB-2019-015440
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-27208
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202004-1229
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-20657
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-015440
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-27208
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-20657
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2019-20657
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2019-015440
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-27208 // JVNDB: JVNDB-2019-015440 // CNNVD: CNNVD-202004-1229 // NVD: CVE-2019-20657 // NVD: CVE-2019-20657

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.8

sources: JVNDB: JVNDB-2019-015440 // NVD: CVE-2019-20657

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202004-1229

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202004-1229

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-015440

PATCH

title:Security Advisory for Post-Authentication Buffer Overflow on Some Routers and Gateways, PSV-2018-0619url:https://kb.netgear.com/000061482/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0619

Trust: 0.8

title:Patch for Multiple NETGEAR product buffer overflow vulnerabilities (CNVD-2020-27208)url:https://www.cnvd.org.cn/patchInfo/show/216875

Trust: 0.6

title:Multiple NETGEAR Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116528

Trust: 0.6

sources: CNVD: CNVD-2020-27208 // JVNDB: JVNDB-2019-015440 // CNNVD: CNNVD-202004-1229

EXTERNAL IDS

db:NVDid:CVE-2019-20657

Trust: 3.0

db:JVNDBid:JVNDB-2019-015440

Trust: 0.8

db:CNVDid:CNVD-2020-27208

Trust: 0.6

db:CNNVDid:CNNVD-202004-1229

Trust: 0.6

sources: CNVD: CNVD-2020-27208 // JVNDB: JVNDB-2019-015440 // CNNVD: CNNVD-202004-1229 // NVD: CVE-2019-20657

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-20657

Trust: 2.0

url:https://kb.netgear.com/000061482/security-advisory-for-post-authentication-buffer-overflow-on-some-routers-and-gateways-psv-2018-0619

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-20657

Trust: 0.8

sources: CNVD: CNVD-2020-27208 // JVNDB: JVNDB-2019-015440 // CNNVD: CNNVD-202004-1229 // NVD: CVE-2019-20657

SOURCES

db:CNVDid:CNVD-2020-27208
db:JVNDBid:JVNDB-2019-015440
db:CNNVDid:CNNVD-202004-1229
db:NVDid:CVE-2019-20657

LAST UPDATE DATE

2024-11-23T21:35:54.787000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-27208date:2020-05-09T00:00:00
db:JVNDBid:JVNDB-2019-015440date:2020-05-19T00:00:00
db:CNNVDid:CNNVD-202004-1229date:2020-04-26T00:00:00
db:NVDid:CVE-2019-20657date:2024-11-21T04:38:59.227

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-27208date:2020-05-09T00:00:00
db:JVNDBid:JVNDB-2019-015440date:2020-05-19T00:00:00
db:CNNVDid:CNNVD-202004-1229date:2020-04-15T00:00:00
db:NVDid:CVE-2019-20657date:2020-04-15T19:15:13.190