ID

VAR-202007-0052


CVE

CVE-2020-10925


TITLE

NETGEAR R6700 Trust Management Issue Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-43148 // CNNVD: CNNVD-202007-1643

DESCRIPTION

This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9647. NETGEAR R6700 A router contains a certificate validation vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-9647 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR R6700 is a wireless router made by NETGEAR. The file download (HTTPS) in NETGEAR R6700 V1.0.4.84_10.0.58 has a trust management vulnerability, which is caused by the program's failure to correctly verify the server's certificate

Trust: 2.79

sources: NVD: CVE-2020-10925 // JVNDB: JVNDB-2020-008749 // ZDI: ZDI-20-705 // CNVD: CNVD-2020-43148

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-43148

AFFECTED PRODUCTS

vendor:netgearmodel:r6700scope:eqversion:1.0.4.84_10.0.58

Trust: 1.8

vendor:netgearmodel:r6700scope: - version: -

Trust: 0.7

vendor:netgearmodel:r6700 v1.0.4.84 10.0.58scope: - version: -

Trust: 0.6

sources: ZDI: ZDI-20-705 // CNVD: CNVD-2020-43148 // JVNDB: JVNDB-2020-008749 // NVD: CVE-2020-10925

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-10925
value: HIGH

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2020-10925
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-008749
value: HIGH

Trust: 0.8

ZDI: ZDI-20-705
value: HIGH

Trust: 0.7

CNVD: CNVD-2020-43148
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202007-1643
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-10925
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-008749
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-43148
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-10925
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2020-10925
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-008749
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: ZDI-20-705
baseSeverity: HIGH
baseScore: 7.5
vectorString: AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-705 // CNVD: CNVD-2020-43148 // JVNDB: JVNDB-2020-008749 // CNNVD: CNNVD-202007-1643 // NVD: CVE-2020-10925 // NVD: CVE-2020-10925

PROBLEMTYPE DATA

problemtype:CWE-295

Trust: 1.8

sources: JVNDB: JVNDB-2020-008749 // NVD: CVE-2020-10925

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202007-1643

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-202007-1643

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-008749

PATCH

title:Top Pageurl:https://www.netgear.com/

Trust: 0.8

sources: JVNDB: JVNDB-2020-008749

EXTERNAL IDS

db:ZDIid:ZDI-20-705

Trust: 3.7

db:NVDid:CVE-2020-10925

Trust: 3.0

db:JVNDBid:JVNDB-2020-008749

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-9647

Trust: 0.7

db:CNVDid:CNVD-2020-43148

Trust: 0.6

db:CNNVDid:CNNVD-202007-1643

Trust: 0.6

sources: ZDI: ZDI-20-705 // CNVD: CNVD-2020-43148 // JVNDB: JVNDB-2020-008749 // CNNVD: CNNVD-202007-1643 // NVD: CVE-2020-10925

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-20-705/

Trust: 3.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-10925

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10925

Trust: 0.8

sources: CNVD: CNVD-2020-43148 // JVNDB: JVNDB-2020-008749 // CNNVD: CNNVD-202007-1643 // NVD: CVE-2020-10925

CREDITS

Pedro Ribeiro and Radek Domanski of Team Flashback

Trust: 0.7

sources: ZDI: ZDI-20-705

SOURCES

db:ZDIid:ZDI-20-705
db:CNVDid:CNVD-2020-43148
db:JVNDBid:JVNDB-2020-008749
db:CNNVDid:CNNVD-202007-1643
db:NVDid:CVE-2020-10925

LAST UPDATE DATE

2024-11-23T22:21:05.957000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-705date:2020-06-15T00:00:00
db:CNVDid:CNVD-2020-43148date:2020-07-30T00:00:00
db:JVNDBid:JVNDB-2020-008749date:2020-09-24T00:00:00
db:CNNVDid:CNNVD-202007-1643date:2020-07-30T00:00:00
db:NVDid:CVE-2020-10925date:2024-11-21T04:56:22.953

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-705date:2020-06-15T00:00:00
db:CNVDid:CNVD-2020-43148date:2020-07-30T00:00:00
db:JVNDBid:JVNDB-2020-008749date:2020-09-24T00:00:00
db:CNNVDid:CNNVD-202007-1643date:2020-07-28T00:00:00
db:NVDid:CVE-2020-10925date:2020-07-28T18:15:13.753