ID

VAR-202007-0055


CVE

CVE-2020-10929


TITLE

NETGEAR R6700 input validation error vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-43150 // CNNVD: CNNVD-202007-1649

DESCRIPTION

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-9768. NETGEAR R6700 The router is vulnerable to integer overflow. Zero Day Initiative To this vulnerability ZDI-CAN-9768 Was numbered.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. There is a security vulnerability in NETGEAR R6700 V1.0.4.84_10.0.58, which is caused by the program's failure to correctly verify the data submitted by the user

Trust: 2.79

sources: NVD: CVE-2020-10929 // JVNDB: JVNDB-2020-008853 // ZDI: ZDI-20-709 // CNVD: CNVD-2020-43150

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-43150

AFFECTED PRODUCTS

vendor:netgearmodel:r6700scope:eqversion:1.0.4.84_10.0.58

Trust: 1.8

vendor:netgearmodel:r6700scope: - version: -

Trust: 0.7

vendor:netgearmodel:r6700 v1.0.4.84 10.0.58scope: - version: -

Trust: 0.6

sources: ZDI: ZDI-20-709 // CNVD: CNVD-2020-43150 // JVNDB: JVNDB-2020-008853 // NVD: CVE-2020-10929

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-10929
value: HIGH

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2020-10929
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-008853
value: HIGH

Trust: 0.8

ZDI: ZDI-20-709
value: HIGH

Trust: 0.7

CNVD: CNVD-2020-43150
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202007-1649
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-10929
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-008853
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-43150
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-10929
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2020-10929
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-008853
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: ZDI-20-709
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-709 // CNVD: CNVD-2020-43150 // JVNDB: JVNDB-2020-008853 // CNNVD: CNNVD-202007-1649 // NVD: CVE-2020-10929 // NVD: CVE-2020-10929

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.8

problemtype:CWE-680

Trust: 1.0

sources: JVNDB: JVNDB-2020-008853 // NVD: CVE-2020-10929

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202007-1649

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202007-1649

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-008853

PATCH

title:Top Pageurl:https://www.netgear.com/

Trust: 0.8

sources: JVNDB: JVNDB-2020-008853

EXTERNAL IDS

db:ZDIid:ZDI-20-709

Trust: 3.7

db:NVDid:CVE-2020-10929

Trust: 3.0

db:JVNDBid:JVNDB-2020-008853

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-9768

Trust: 0.7

db:CNVDid:CNVD-2020-43150

Trust: 0.6

db:CNNVDid:CNNVD-202007-1649

Trust: 0.6

sources: ZDI: ZDI-20-709 // CNVD: CNVD-2020-43150 // JVNDB: JVNDB-2020-008853 // CNNVD: CNNVD-202007-1649 // NVD: CVE-2020-10929

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-20-709/

Trust: 3.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-10929

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10929

Trust: 0.8

sources: CNVD: CNVD-2020-43150 // JVNDB: JVNDB-2020-008853 // CNNVD: CNNVD-202007-1649 // NVD: CVE-2020-10929

CREDITS

d4rkn3ss from VNPT ISC

Trust: 0.7

sources: ZDI: ZDI-20-709

SOURCES

db:ZDIid:ZDI-20-709
db:CNVDid:CNVD-2020-43150
db:JVNDBid:JVNDB-2020-008853
db:CNNVDid:CNNVD-202007-1649
db:NVDid:CVE-2020-10929

LAST UPDATE DATE

2024-11-23T23:11:24.012000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-709date:2020-06-15T00:00:00
db:CNVDid:CNVD-2020-43150date:2020-07-30T00:00:00
db:JVNDBid:JVNDB-2020-008853date:2020-09-29T00:00:00
db:CNNVDid:CNNVD-202007-1649date:2020-07-31T00:00:00
db:NVDid:CVE-2020-10929date:2024-11-21T04:56:23.437

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-709date:2020-06-15T00:00:00
db:CNVDid:CNVD-2020-43150date:2020-07-30T00:00:00
db:JVNDBid:JVNDB-2020-008853date:2020-09-29T00:00:00
db:CNNVDid:CNNVD-202007-1649date:2020-07-28T00:00:00
db:NVDid:CVE-2020-10929date:2020-07-28T18:15:14.097