ID

VAR-202012-1186


CVE

CVE-2020-35787


TITLE

plural  NETGEAR  Classic buffer overflow vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2020-014979

DESCRIPTION

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40. plural NETGEAR A classic buffer overflow vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2020-35787 // JVNDB: JVNDB-2020-014979

AFFECTED PRODUCTS

vendor:netgearmodel:r6300scope:ltversion:1.0.4.34

Trust: 1.0

vendor:netgearmodel:r9000scope:ltversion:1.0.4.12

Trust: 1.0

vendor:netgearmodel:d6000scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.1.64

Trust: 1.0

vendor:netgearmodel:r6080scope:ltversion:1.0.0.42

Trust: 1.0

vendor:netgearmodel:r6050scope:ltversion:1.0.1.18

Trust: 1.0

vendor:netgearmodel:r6220scope:ltversion:1.1.0.80

Trust: 1.0

vendor:netgearmodel:d3600scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:ex8000scope:ltversion:1.0.1.186

Trust: 1.0

vendor:netgearmodel:d6200scope:ltversion:1.1.00.36

Trust: 1.0

vendor:netgearmodel:jr6150scope:ltversion:1.0.1.18

Trust: 1.0

vendor:netgearmodel:r6020scope:ltversion:1.0.0.42

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:pr2000scope:ltversion:1.0.0.28

Trust: 1.0

vendor:netgearmodel:r6260scope:ltversion:1.1.0.64

Trust: 1.0

vendor:netgearmodel:ex7000scope:ltversion:1.0.1.78

Trust: 1.0

vendor:netgearmodel:r6800scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:r7800scope:ltversion:1.0.2.60

Trust: 1.0

vendor:netgearmodel:xr500scope:ltversion:2.3.2.40

Trust: 1.0

vendor:netgearmodel:ex6200scope:ltversion:1.0.1.78

Trust: 1.0

vendor:netgearmodel:r8900scope:ltversion:1.0.4.12

Trust: 1.0

vendor:netgearmodel:r6120scope:ltversion:1.0.0.46

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.1.64

Trust: 1.0

vendor:netgearmodel:d7000scope:ltversion:1.0.1.70

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.9.42

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.0.2.6

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.0.2.4

Trust: 1.0

vendor:ネットギアmodel:d3600scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6200scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:jr6150scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex8000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:pr2000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6200scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6020scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-014979 // NVD: CVE-2020-35787

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-35787
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2020-35787
value: HIGH

Trust: 1.0

NVD: CVE-2020-35787
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202012-1789
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-35787
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2020-35787
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2020-014979
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-014979 // CNNVD: CNNVD-202012-1789 // NVD: CVE-2020-35787 // NVD: CVE-2020-35787

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-014979 // NVD: CVE-2020-35787

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202012-1789

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202012-1789

PATCH

title:Security Advisory for Post-Authentication Buffer Overflow on Some Routers and Range Extenders, PSV-2018-0379url:https://kb.netgear.com/000062710/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Range-Extenders-PSV-2018-0379

Trust: 0.8

title:NETGEAR Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138158

Trust: 0.6

sources: JVNDB: JVNDB-2020-014979 // CNNVD: CNNVD-202012-1789

EXTERNAL IDS

db:NVDid:CVE-2020-35787

Trust: 2.4

db:JVNDBid:JVNDB-2020-014979

Trust: 0.8

db:CNNVDid:CNNVD-202012-1789

Trust: 0.6

sources: JVNDB: JVNDB-2020-014979 // CNNVD: CNNVD-202012-1789 // NVD: CVE-2020-35787

REFERENCES

url:https://kb.netgear.com/000062710/security-advisory-for-post-authentication-buffer-overflow-on-some-routers-and-range-extenders-psv-2018-0379

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-35787

Trust: 1.4

sources: JVNDB: JVNDB-2020-014979 // CNNVD: CNNVD-202012-1789 // NVD: CVE-2020-35787

SOURCES

db:JVNDBid:JVNDB-2020-014979
db:CNNVDid:CNNVD-202012-1789
db:NVDid:CVE-2020-35787

LAST UPDATE DATE

2024-11-23T22:54:56.981000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-014979date:2021-09-07T06:17:00
db:CNNVDid:CNNVD-202012-1789date:2021-01-05T00:00:00
db:NVDid:CVE-2020-35787date:2024-11-21T05:28:05.810

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-014979date:2021-09-07T00:00:00
db:CNNVDid:CNNVD-202012-1789date:2020-12-29T00:00:00
db:NVDid:CVE-2020-35787date:2020-12-30T00:15:13.533