ID

VAR-202006-0929


CVE

CVE-2020-14432


TITLE

plural NETGEAR Cross-site request forgery vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2020-006797

DESCRIPTION

Certain NETGEAR devices are affected by CSRF. This affects RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. plural NETGEAR A cross-site request forgery vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR RBK752, etc. are all home WiFi systems of NETGEAR. The vulnerability stems from the fact that the WEB application does not fully verify whether the request comes from a trusted user. An attacker can use this vulnerability to send unexpected requests to the server through the affected client

Trust: 2.16

sources: NVD: CVE-2020-14432 // JVNDB: JVNDB-2020-006797 // CNVD: CNVD-2021-44777

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-44777

AFFECTED PRODUCTS

vendor:netgearmodel:rbk752scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbr750scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbs750scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbk753scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbk753sscope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbk842scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbr840scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbs840scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbk852scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbk853scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbr850scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbs850scope:ltversion:3.2.15.25

Trust: 1.6

vendor:netgearmodel:rbk752scope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbk753scope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbk753sscope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbk842scope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbk852scope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbk853scope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbr750scope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbr840scope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbs750scope:eqversion:3.2.15.25

Trust: 0.8

vendor:netgearmodel:rbs840scope:eqversion:3.2.15.25

Trust: 0.8

sources: CNVD: CNVD-2021-44777 // JVNDB: JVNDB-2020-006797 // NVD: CVE-2020-14432

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-14432
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2020-14432
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-006797
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-44777
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202006-1247
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-14432
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-006797
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-44777
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-14432
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2020-14432
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.7
impactScore: 6.0
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-006797
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-44777 // JVNDB: JVNDB-2020-006797 // CNNVD: CNNVD-202006-1247 // NVD: CVE-2020-14432 // NVD: CVE-2020-14432

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.8

sources: JVNDB: JVNDB-2020-006797 // NVD: CVE-2020-14432

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202006-1247

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-202006-1247

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-006797

PATCH

title:Security Advisory for Cross Site Request Forgery on Some WiFi Systems, PSV-2020-0049url:https://kb.netgear.com/000061937/Security-Advisory-for-Cross-Site-Request-Forgery-on-Some-WiFi-Systems-PSV-2020-0049

Trust: 0.8

title:Patch for Cross-site request forgery vulnerabilities in multiple NETGEAR products (CNVD-2021-44777)url:https://www.cnvd.org.cn/patchInfo/show/275101

Trust: 0.6

title:Multiple NETGEAR Repair measures for product cross-site request forgery vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=121995

Trust: 0.6

sources: CNVD: CNVD-2021-44777 // JVNDB: JVNDB-2020-006797 // CNNVD: CNNVD-202006-1247

EXTERNAL IDS

db:NVDid:CVE-2020-14432

Trust: 3.0

db:JVNDBid:JVNDB-2020-006797

Trust: 0.8

db:CNVDid:CNVD-2021-44777

Trust: 0.6

db:CNNVDid:CNNVD-202006-1247

Trust: 0.6

sources: CNVD: CNVD-2021-44777 // JVNDB: JVNDB-2020-006797 // CNNVD: CNNVD-202006-1247 // NVD: CVE-2020-14432

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-14432

Trust: 2.0

url:https://kb.netgear.com/000061937/security-advisory-for-cross-site-request-forgery-on-some-wifi-systems-psv-2020-0049

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14432

Trust: 0.8

sources: CNVD: CNVD-2021-44777 // JVNDB: JVNDB-2020-006797 // CNNVD: CNNVD-202006-1247 // NVD: CVE-2020-14432

SOURCES

db:CNVDid:CNVD-2021-44777
db:JVNDBid:JVNDB-2020-006797
db:CNNVDid:CNNVD-202006-1247
db:NVDid:CVE-2020-14432

LAST UPDATE DATE

2024-11-23T22:16:27.342000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-44777date:2021-06-24T00:00:00
db:JVNDBid:JVNDB-2020-006797date:2020-07-17T00:00:00
db:CNNVDid:CNNVD-202006-1247date:2020-06-30T00:00:00
db:NVDid:CVE-2020-14432date:2024-11-21T05:03:15.507

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-44777date:2020-06-24T00:00:00
db:JVNDBid:JVNDB-2020-006797date:2020-07-17T00:00:00
db:CNNVDid:CNNVD-202006-1247date:2020-06-18T00:00:00
db:NVDid:CVE-2020-14432date:2020-06-18T17:15:12.327