ID

VAR-202012-1194


CVE

CVE-2020-35795


TITLE

plural  NETGEAR  Classic buffer overflow vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2020-015039

DESCRIPTION

Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects AC2100 before 1.2.0.72, AC2400 before 1.2.0.72, AC2600 before 1.2.0.72, CBK40 before 2.5.0.10, CBR40 before 2.5.0.10, D7800 before 1.0.1.58, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX7500 before 1.0.0.68, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6120 before 1.0.0.70, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.76, R6330 before 1.1.0.76, R6350 before 1.1.0.76, R6400 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700 before 1.0.2.16, R6700v2 before 1.2.0.72, R6700v3 before 1.0.4.98, R6800 before 1.2.0.72, R6850 before 1.1.0.76, R6900P before 1.3.2.124, R6900 before 1.0.2.16, R6900v2 before 1.2.0.72, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7200 before 1.2.0.72, R7350 before 1.2.0.72, R7400 before 1.2.0.72, R7450 before 1.2.0.72, R7800 before 1.0.2.74, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8900 before 1.0.5.24, R9000 before 1.0.5.24, RAX120 before 1.0.1.136, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.2.102, RAX45 before 1.0.2.64, RAX50 before 1.0.2.64, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RS400 before 1.5.0.48, XR300 before 1.0.3.50, XR450 before 2.3.2.66, XR500 before 2.3.2.66, and XR700 before 1.0.1.34. plural NETGEAR A classic buffer overflow vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2020-35795 // JVNDB: JVNDB-2020-015039

AFFECTED PRODUCTS

vendor:netgearmodel:ms60scope:ltversion:1.0.5.102

Trust: 1.0

vendor:netgearmodel:r7400scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.2.102

Trust: 1.0

vendor:netgearmodel:rbr50scope:ltversion:2.6.1.40

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.0.2.16

Trust: 1.0

vendor:netgearmodel:r7350scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:mk62scope:ltversion:1.0.5.102

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rbk50scope:ltversion:2.6.1.40

Trust: 1.0

vendor:netgearmodel:rbk12scope:ltversion:2.6.1.44

Trust: 1.0

vendor:netgearmodel:rbs10scope:ltversion:2.6.1.44

Trust: 1.0

vendor:netgearmodel:cbk40scope:ltversion:2.5.0.10

Trust: 1.0

vendor:netgearmodel:rax120scope:ltversion:1.0.1.136

Trust: 1.0

vendor:netgearmodel:rbr40scope:ltversion:2.6.1.36

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.3.102

Trust: 1.0

vendor:netgearmodel:r6230scope:ltversion:1.1.0.100

Trust: 1.0

vendor:netgearmodel:r9000scope:ltversion:1.0.5.24

Trust: 1.0

vendor:netgearmodel:eax80scope:ltversion:1.0.1.62

Trust: 1.0

vendor:netgearmodel:r7800scope:ltversion:1.0.2.74

Trust: 1.0

vendor:netgearmodel:ac2100scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:r7900scope:ltversion:1.0.4.26

Trust: 1.0

vendor:netgearmodel:xr300scope:ltversion:1.0.3.50

Trust: 1.0

vendor:netgearmodel:d7800scope:ltversion:1.0.1.58

Trust: 1.0

vendor:netgearmodel:rax50scope:ltversion:1.0.2.64

Trust: 1.0

vendor:netgearmodel:r6260scope:ltversion:1.1.0.76

Trust: 1.0

vendor:netgearmodel:r8900scope:ltversion:1.0.5.24

Trust: 1.0

vendor:netgearmodel:rbk20scope:ltversion:2.6.1.38

Trust: 1.0

vendor:netgearmodel:r6120scope:ltversion:1.0.0.70

Trust: 1.0

vendor:netgearmodel:rbr20scope:ltversion:2.6.1.36

Trust: 1.0

vendor:netgearmodel:xr700scope:ltversion:1.0.1.34

Trust: 1.0

vendor:netgearmodel:ex7500scope:ltversion:1.0.0.68

Trust: 1.0

vendor:netgearmodel:xr500scope:ltversion:2.3.2.66

Trust: 1.0

vendor:netgearmodel:rbr840scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.1.62

Trust: 1.0

vendor:netgearmodel:rax20scope:ltversion:1.0.1.64

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rbs20scope:ltversion:2.6.1.38

Trust: 1.0

vendor:netgearmodel:r6700v3scope:ltversion:1.0.4.98

Trust: 1.0

vendor:netgearmodel:ac2600scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:ac2400scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:cbr40scope:ltversion:2.5.0.10

Trust: 1.0

vendor:netgearmodel:rbs50scope:ltversion:2.6.1.40

Trust: 1.0

vendor:netgearmodel:r6330scope:ltversion:1.1.0.76

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.1.62

Trust: 1.0

vendor:netgearmodel:r6800scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.2.124

Trust: 1.0

vendor:netgearmodel:xr450scope:ltversion:2.3.2.66

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.0.48

Trust: 1.0

vendor:netgearmodel:r6900v2scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:r6350scope:ltversion:1.1.0.76

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.106

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.4.98

Trust: 1.0

vendor:netgearmodel:r7850scope:ltversion:1.0.5.60

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.62

Trust: 1.0

vendor:netgearmodel:mr60scope:ltversion:1.0.5.102

Trust: 1.0

vendor:netgearmodel:eax20scope:ltversion:1.0.0.36

Trust: 1.0

vendor:netgearmodel:rbk842scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rbr750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r7200scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:r6700v2scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.58

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.3.102

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.0.2.16

Trust: 1.0

vendor:netgearmodel:rax45scope:ltversion:1.0.2.64

Trust: 1.0

vendor:netgearmodel:rbk40scope:ltversion:2.6.1.38

Trust: 1.0

vendor:netgearmodel:rbs40scope:ltversion:2.6.1.38

Trust: 1.0

vendor:netgearmodel:rax15scope:ltversion:1.0.1.64

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r6220scope:ltversion:1.1.0.100

Trust: 1.0

vendor:netgearmodel:r6850scope:ltversion:1.1.0.76

Trust: 1.0

vendor:netgearmodel:r7450scope:ltversion:1.2.0.72

Trust: 1.0

vendor:netgearmodel:rbs840scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.1.62

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.2.124

Trust: 1.0

vendor:netgearmodel:rbr10scope:ltversion:2.6.1.44

Trust: 1.0

vendor:ネットギアmodel:ac2400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:mk62scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbk40scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex7500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:eax20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ac2600scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:eax80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ac2100scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbr40scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-015039 // NVD: CVE-2020-35795

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-35795
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2020-35795
value: CRITICAL

Trust: 1.0

NVD: CVE-2020-35795
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202012-1750
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-35795
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2020-35795
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

OTHER: JVNDB-2020-015039
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-015039 // CNNVD: CNNVD-202012-1750 // NVD: CVE-2020-35795 // NVD: CVE-2020-35795

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015039 // NVD: CVE-2020-35795

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202012-1750

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202012-1750

PATCH

title:Security Advisory for Pre-Authentication Buffer Overflow on Some Routers, Range Extenders, and Orbi WiFi Systems, PSV-2020-0154url:https://kb.netgear.com/000062735/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Range-Extenders-and-Orbi-WiFi-Systems-PSV-2020-0154

Trust: 0.8

title:Certain NETGEAR devices Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138129

Trust: 0.6

sources: JVNDB: JVNDB-2020-015039 // CNNVD: CNNVD-202012-1750

EXTERNAL IDS

db:NVDid:CVE-2020-35795

Trust: 2.4

db:JVNDBid:JVNDB-2020-015039

Trust: 0.8

db:CNNVDid:CNNVD-202012-1750

Trust: 0.6

sources: JVNDB: JVNDB-2020-015039 // CNNVD: CNNVD-202012-1750 // NVD: CVE-2020-35795

REFERENCES

url:https://kb.netgear.com/000062735/security-advisory-for-pre-authentication-buffer-overflow-on-some-routers-range-extenders-and-orbi-wifi-systems-psv-2020-0154

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-35795

Trust: 1.4

sources: JVNDB: JVNDB-2020-015039 // CNNVD: CNNVD-202012-1750 // NVD: CVE-2020-35795

SOURCES

db:JVNDBid:JVNDB-2020-015039
db:CNNVDid:CNNVD-202012-1750
db:NVDid:CVE-2020-35795

LAST UPDATE DATE

2024-11-23T23:01:10.862000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-015039date:2021-09-08T08:43:00
db:CNNVDid:CNNVD-202012-1750date:2021-01-12T00:00:00
db:NVDid:CVE-2020-35795date:2024-11-21T05:28:07.420

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-015039date:2021-09-08T00:00:00
db:CNNVDid:CNNVD-202012-1750date:2020-12-29T00:00:00
db:NVDid:CVE-2020-35795date:2020-12-30T00:15:14.080