ID

VAR-202012-1190


CVE

CVE-2020-35791


TITLE

plural  NETGEAR  Command injection vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2020-014789

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7800 before 1.0.2.68, R8900 before 1.0.5.2, and R9000 before 1.0.5.2. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR R7800 is an AC2600 dual-band Gigabit wireless router. NETGEAR R8900 is a Nighthawk X10 AD7000 smart WiFi router. NETGEAR R9000 is a Nighthawk X10 AD7200 smart WiFi router. No detailed vulnerability details are currently provided

Trust: 2.16

sources: NVD: CVE-2020-35791 // JVNDB: JVNDB-2020-014789 // CNVD: CNVD-2021-03352

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-03352

AFFECTED PRODUCTS

vendor:netgearmodel:r7800scope:ltversion:1.0.2.68

Trust: 1.6

vendor:netgearmodel:r8900scope:ltversion:1.0.5.2

Trust: 1.6

vendor:netgearmodel:r9000scope:ltversion:1.0.5.2

Trust: 1.6

vendor:ネットギアmodel:r7800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8900scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r9000scope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2021-03352 // JVNDB: JVNDB-2020-014789 // NVD: CVE-2020-35791

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-35791
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2020-35791
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-35791
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-03352
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202012-1799
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-35791
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2021-03352
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-35791
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2020-35791
baseSeverity: MEDIUM
baseScore: 6.4
vectorString: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.5
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-35791
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-03352 // JVNDB: JVNDB-2020-014789 // CNNVD: CNNVD-202012-1799 // NVD: CVE-2020-35791 // NVD: CVE-2020-35791

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-014789 // NVD: CVE-2020-35791

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202012-1799

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202012-1799

PATCH

title:Security Advisory for Post-Authentication Command Injection on Some Routers, PSV-2019-0079url:https://kb.netgear.com/000062714/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0079

Trust: 0.8

title:Patch for NETGEAR R7800/R8900/R9000 command injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/243715

Trust: 0.6

title:Multiple NETGEAR Fixes for device command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138290

Trust: 0.6

sources: CNVD: CNVD-2021-03352 // JVNDB: JVNDB-2020-014789 // CNNVD: CNNVD-202012-1799

EXTERNAL IDS

db:NVDid:CVE-2020-35791

Trust: 3.0

db:JVNDBid:JVNDB-2020-014789

Trust: 0.8

db:CNVDid:CNVD-2021-03352

Trust: 0.6

db:CNNVDid:CNNVD-202012-1799

Trust: 0.6

sources: CNVD: CNVD-2021-03352 // JVNDB: JVNDB-2020-014789 // CNNVD: CNNVD-202012-1799 // NVD: CVE-2020-35791

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-35791

Trust: 2.0

url:https://kb.netgear.com/000062714/security-advisory-for-post-authentication-command-injection-on-some-routers-psv-2019-0079

Trust: 1.6

sources: CNVD: CNVD-2021-03352 // JVNDB: JVNDB-2020-014789 // CNNVD: CNNVD-202012-1799 // NVD: CVE-2020-35791

SOURCES

db:CNVDid:CNVD-2021-03352
db:JVNDBid:JVNDB-2020-014789
db:CNNVDid:CNNVD-202012-1799
db:NVDid:CVE-2020-35791

LAST UPDATE DATE

2024-11-23T22:40:49.547000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-03352date:2021-07-15T00:00:00
db:JVNDBid:JVNDB-2020-014789date:2021-08-31T05:13:00
db:CNNVDid:CNNVD-202012-1799date:2021-01-05T00:00:00
db:NVDid:CVE-2020-35791date:2024-11-21T05:28:06.670

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-03352date:2020-12-29T00:00:00
db:JVNDBid:JVNDB-2020-014789date:2021-08-31T00:00:00
db:CNNVDid:CNNVD-202012-1799date:2020-12-29T00:00:00
db:NVDid:CVE-2020-35791date:2020-12-30T00:15:13.817