ID

VAR-202004-1551


CVE

CVE-2018-21115


TITLE

NETGEAR XR500 input validation error vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-31332 // CNNVD: CNNVD-202004-1897

DESCRIPTION

NETGEAR XR500 devices before 2.3.2.32 are affected by remote code execution by unauthenticated attackers. NETGEAR XR500 The device contains an input verification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR XR500 is a wireless router of NETGEAR

Trust: 2.16

sources: NVD: CVE-2018-21115 // JVNDB: JVNDB-2018-016291 // CNVD: CNVD-2020-31332

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-31332

AFFECTED PRODUCTS

vendor:netgearmodel:xr500scope:ltversion:2.3.2.32

Trust: 1.6

vendor:netgearmodel:xr500scope:eqversion:2.3.2.32

Trust: 0.8

sources: CNVD: CNVD-2020-31332 // JVNDB: JVNDB-2018-016291 // NVD: CVE-2018-21115

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-21115
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2018-21115
value: HIGH

Trust: 1.0

NVD: JVNDB-2018-016291
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-31332
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202004-1897
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2018-21115
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2018-016291
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-31332
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-21115
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2018-21115
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2018-016291
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-31332 // JVNDB: JVNDB-2018-016291 // CNNVD: CNNVD-202004-1897 // NVD: CVE-2018-21115 // NVD: CVE-2018-21115

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2018-016291 // NVD: CVE-2018-21115

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202004-1897

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202004-1897

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-016291

PATCH

title:Security Advisory for Unauthenticated Remote Code Execution on XR500, PSV-2018-0309url:https://kb.netgear.com/000060243/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-XR500-PSV-2018-0309

Trust: 0.8

title:Patch for NETGEAR XR500 input validation error vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/219993

Trust: 0.6

title:NETGEAR XR500 Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117004

Trust: 0.6

sources: CNVD: CNVD-2020-31332 // JVNDB: JVNDB-2018-016291 // CNNVD: CNNVD-202004-1897

EXTERNAL IDS

db:NVDid:CVE-2018-21115

Trust: 3.0

db:JVNDBid:JVNDB-2018-016291

Trust: 0.8

db:CNVDid:CNVD-2020-31332

Trust: 0.6

db:CNNVDid:CNNVD-202004-1897

Trust: 0.6

sources: CNVD: CNVD-2020-31332 // JVNDB: JVNDB-2018-016291 // CNNVD: CNNVD-202004-1897 // NVD: CVE-2018-21115

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-21115

Trust: 2.0

url:https://kb.netgear.com/000060243/security-advisory-for-pre-authentication-stack-overflow-on-xr500-psv-2018-0309

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-21115

Trust: 0.8

sources: CNVD: CNVD-2020-31332 // JVNDB: JVNDB-2018-016291 // CNNVD: CNNVD-202004-1897 // NVD: CVE-2018-21115

SOURCES

db:CNVDid:CNVD-2020-31332
db:JVNDBid:JVNDB-2018-016291
db:CNNVDid:CNNVD-202004-1897
db:NVDid:CVE-2018-21115

LAST UPDATE DATE

2024-11-23T23:01:24.254000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-31332date:2020-06-03T00:00:00
db:JVNDBid:JVNDB-2018-016291date:2020-05-20T00:00:00
db:CNNVDid:CNNVD-202004-1897date:2020-04-24T00:00:00
db:NVDid:CVE-2018-21115date:2024-11-21T04:02:56.283

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-31332date:2020-06-03T00:00:00
db:JVNDBid:JVNDB-2018-016291date:2020-05-20T00:00:00
db:CNNVDid:CNNVD-202004-1897date:2020-04-22T00:00:00
db:NVDid:CVE-2018-21115date:2020-04-22T15:15:13.583