ID

VAR-202012-1195


CVE

CVE-2020-35796


TITLE

plural  NETGEAR  Classic buffer overflow vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2020-015040

DESCRIPTION

Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects CBR40 before 2.5.0.10, D6220 before 1.0.0.60, D6400 before 1.0.0.94, D7000v2 before 1.0.0.62, D8500 before 1.0.3.50, DC112A before 1.0.0.48, DGN2200v4 before 1.0.0.114, EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX3700 before 1.0.0.84, EX3800 before 1.0.0.84, EX3920 before 1.0.0.84, EX6000 before 1.0.0.44, EX6100 before 1.0.2.28, EX6120 before 1.0.0.54, EX6130 before 1.0.0.36, EX6150 before 1.0.0.46, EX6200 before 1.0.3.94, EX6920 before 1.0.0.54, EX7000 before 1.0.1.90, EX7500 before 1.0.0.68, MK62 before 1.0.5.102, MR60 before 1.0.5.102, MS60 before 1.0.5.102, R6250 before 1.0.4.42, R6300v2 before 1.0.4.42, R6400 before 1.0.1.62, R6400v2 before 1.0.4.98, R6700v3 before 1.0.4.98, R6700 before 1.0.2.16, R6900P before 1.3.2.124, R6900 before 1.0.2.16, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7100LG before 1.0.0.56, R7850 before 1.0.5.60, R7900 before 1.0.4.26, R7900P before 1.4.1.62, R7960P before 1.4.1.62, R8000 before 1.0.4.58, R8000P before 1.4.1.62, R8300 before 1.0.2.134, R8500 before 1.0.2.134, RAX15 before 1.0.1.64, RAX20 before 1.0.1.64, RAX200 before 1.0.2.102, RAX45 before 1.0.2.32, RAX50 before 1.0.2.32, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBS40V-200 before 1.0.0.46, RBW30 before 2.5.0.4, RS400 before 1.5.0.48, WN2500RPv2 before 1.0.1.56, WN3500RP before 1.0.0.28, WNDR3400v3 before 1.0.1.32, WNR1000v3 before 1.0.2.78, WNR2000v2 before 1.2.0.12, WNR3500Lv2 before 1.2.0.62, and XR300 before 1.0.3.50. plural NETGEAR A classic buffer overflow vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2020-35796 // JVNDB: JVNDB-2020-015040

AFFECTED PRODUCTS

vendor:netgearmodel:cbr40scope:ltversion:2.5.0.10

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.60

Trust: 1.0

vendor:netgearmodel:ex3920scope:ltversion:1.0.0.84

Trust: 1.0

vendor:netgearmodel:ex7000scope:ltversion:1.0.1.90

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:ms60scope:ltversion:1.0.5.102

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.1.62

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.2.124

Trust: 1.0

vendor:netgearmodel:r6250scope:ltversion:1.0.4.42

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.2.102

Trust: 1.0

vendor:netgearmodel:rax50scope:ltversion:1.0.2.32

Trust: 1.0

vendor:netgearmodel:ex6150scope:ltversion:1.0.0.46

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.0.2.16

Trust: 1.0

vendor:netgearmodel:ex6920scope:ltversion:1.0.0.54

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.0.48

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.1.62

Trust: 1.0

vendor:netgearmodel:dc112ascope:ltversion:1.0.0.48

Trust: 1.0

vendor:netgearmodel:mk62scope:ltversion:1.0.5.102

Trust: 1.0

vendor:netgearmodel:ex3700scope:ltversion:1.0.0.84

Trust: 1.0

vendor:netgearmodel:r8300scope:ltversion:1.0.2.134

Trust: 1.0

vendor:netgearmodel:ex6130scope:ltversion:1.0.0.36

Trust: 1.0

vendor:netgearmodel:rax20scope:ltversion:1.0.1.64

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.106

Trust: 1.0

vendor:netgearmodel:rx45scope:ltversion:1.0.2.32

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.4.98

Trust: 1.0

vendor:netgearmodel:ex6000scope:ltversion:1.0.0.44

Trust: 1.0

vendor:netgearmodel:ex3800scope:ltversion:1.0.0.84

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rbs40v-200scope:ltversion:1.0.0.46

Trust: 1.0

vendor:netgearmodel:ex6120scope:ltversion:1.0.0.54

Trust: 1.0

vendor:netgearmodel:ex6200scope:ltversion:1.0.3.94

Trust: 1.0

vendor:netgearmodel:r7850scope:ltversion:1.0.5.60

Trust: 1.0

vendor:netgearmodel:wn2500rpv2scope:ltversion:1.0.1.56

Trust: 1.0

vendor:netgearmodel:wnr1000v3scope:ltversion:1.0.2.78

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.62

Trust: 1.0

vendor:netgearmodel:mr60scope:ltversion:1.0.5.102

Trust: 1.0

vendor:netgearmodel:eax20scope:ltversion:1.0.0.36

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.3.102

Trust: 1.0

vendor:netgearmodel:r8500scope:ltversion:1.0.2.134

Trust: 1.0

vendor:netgearmodel:rbk842scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:eax80scope:ltversion:1.0.1.62

Trust: 1.0

vendor:netgearmodel:wn3500rpscope:ltversion:1.0.0.28

Trust: 1.0

vendor:netgearmodel:rbr750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rbw30scope:ltversion:2.5.0.4

Trust: 1.0

vendor:netgearmodel:r7900scope:ltversion:1.0.4.26

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.94

Trust: 1.0

vendor:netgearmodel:r6300v2scope:ltversion:1.0.4.42

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.58

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.56

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.3.102

Trust: 1.0

vendor:netgearmodel:xr300scope:ltversion:1.0.3.50

Trust: 1.0

vendor:netgearmodel:wnr2000v2scope:ltversion:1.2.0.12

Trust: 1.0

vendor:netgearmodel:ex6100scope:ltversion:1.0.2.28

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.0.2.16

Trust: 1.0

vendor:netgearmodel:dgn2200v4scope:ltversion:1.0.0.114

Trust: 1.0

vendor:netgearmodel:rax15scope:ltversion:1.0.1.64

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:wndr3400v3scope:ltversion:1.0.1.32

Trust: 1.0

vendor:netgearmodel:rbs840scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.1.62

Trust: 1.0

vendor:netgearmodel:d8500scope:ltversion:1.0.3.50

Trust: 1.0

vendor:netgearmodel:ex7500scope:ltversion:1.0.0.68

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.2.124

Trust: 1.0

vendor:netgearmodel:d7000v2scope:ltversion:1.0.0.62

Trust: 1.0

vendor:netgearmodel:wnr3500lv2scope:ltversion:1.2.0.62

Trust: 1.0

vendor:netgearmodel:rbr840scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r6700v3scope:ltversion:1.0.4.98

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:ネットギアmodel:d6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6220scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex3700scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:dc112ascope: - version: -

Trust: 0.8

vendor:ネットギアmodel:dgn2200v4scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7000v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:eax20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d8500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:eax80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbr40scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-015040 // NVD: CVE-2020-35796

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-35796
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2020-35796
value: HIGH

Trust: 1.0

NVD: CVE-2020-35796
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202012-1747
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2020-35796
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2020-35796
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2020-35796
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-35796
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-015040 // CNNVD: CNNVD-202012-1747 // NVD: CVE-2020-35796 // NVD: CVE-2020-35796

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015040 // NVD: CVE-2020-35796

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202012-1747

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202012-1747

PATCH

title:Security Advisory for Pre-Authentication Buffer Overflow on Some Routers, Range Extenders, and WiFi Systems, PSV-2020-0201url:https://kb.netgear.com/000062717/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Range-Extenders-and-WiFi-Systems-PSV-2020-0201

Trust: 0.8

title:Certain NETGEAR devices Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138126

Trust: 0.6

sources: JVNDB: JVNDB-2020-015040 // CNNVD: CNNVD-202012-1747

EXTERNAL IDS

db:NVDid:CVE-2020-35796

Trust: 2.4

db:JVNDBid:JVNDB-2020-015040

Trust: 0.8

db:CNNVDid:CNNVD-202012-1747

Trust: 0.6

sources: JVNDB: JVNDB-2020-015040 // CNNVD: CNNVD-202012-1747 // NVD: CVE-2020-35796

REFERENCES

url:https://kb.netgear.com/000062717/security-advisory-for-pre-authentication-buffer-overflow-on-some-routers-range-extenders-and-wifi-systems-psv-2020-0201

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-35796

Trust: 1.4

sources: JVNDB: JVNDB-2020-015040 // CNNVD: CNNVD-202012-1747 // NVD: CVE-2020-35796

SOURCES

db:JVNDBid:JVNDB-2020-015040
db:CNNVDid:CNNVD-202012-1747
db:NVDid:CVE-2020-35796

LAST UPDATE DATE

2024-11-23T22:16:10.698000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-015040date:2021-09-08T08:43:00
db:CNNVDid:CNNVD-202012-1747date:2021-01-12T00:00:00
db:NVDid:CVE-2020-35796date:2024-11-21T05:28:07.700

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-015040date:2021-09-08T00:00:00
db:CNNVDid:CNNVD-202012-1747date:2020-12-29T00:00:00
db:NVDid:CVE-2020-35796date:2020-12-30T00:15:14.160