ID

VAR-202102-0344


CVE

CVE-2020-27873


TITLE

NETGEAR R7450 Access Control Error Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2022-06703 // CNNVD: CNNVD-202102-384

DESCRIPTION

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-11559. NETGEAR R7450 A router contains a vulnerability related to unauthorized authentication. Zero Day Initiative To this vulnerability ZDI-CAN-11559 Was numbered.Information may be obtained. NETGEAR R7450 is a router from Netgear. A hardware device that connects two or more networks and acts as a gateway between the networks

Trust: 2.88

sources: NVD: CVE-2020-27873 // JVNDB: JVNDB-2020-015835 // ZDI: ZDI-21-072 // CNVD: CNVD-2022-06703 // VULMON: CVE-2020-27873

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-06703

AFFECTED PRODUCTS

vendor:netgearmodel:r6230scope:ltversion:1.1.0.104

Trust: 1.0

vendor:netgearmodel:r6020scope:ltversion:1.0.0.48

Trust: 1.0

vendor:netgearmodel:r7450scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6850scope:ltversion:1.1.0.78

Trust: 1.0

vendor:netgearmodel:ac2600scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:ac2400scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r7200scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:ac2100scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6080scope:ltversion:1.0.0.48

Trust: 1.0

vendor:netgearmodel:r6330scope:ltversion:1.1.0.78

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r7400scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6220scope:ltversion:1.1.0.104

Trust: 1.0

vendor:netgearmodel:r6800scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6120scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:r6350scope:ltversion:1.1.0.78

Trust: 1.0

vendor:netgearmodel:r6260scope:ltversion:1.1.0.78

Trust: 1.0

vendor:netgearmodel:r7350scope:ltversion:1.2.0.76

Trust: 1.0

vendor:ネットギアmodel:ac2100scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7200scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6900scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ac2400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ac2600scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7450scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7350scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6700scope: - version: -

Trust: 0.8

vendor:netgearmodel:r7450scope: - version: -

Trust: 0.7

vendor:netgearmodel:r7450 1.2.0.62 1.0.1scope: - version: -

Trust: 0.6

sources: ZDI: ZDI-21-072 // CNVD: CNVD-2022-06703 // JVNDB: JVNDB-2020-015835 // NVD: CVE-2020-27873

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-27873
value: MEDIUM

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2020-27873
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-27873
value: MEDIUM

Trust: 0.8

ZDI: CVE-2020-27873
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2022-06703
value: LOW

Trust: 0.6

CNNVD: CNNVD-202102-384
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-27873
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2022-06703
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2020-27873
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2020-27873
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

ZDI: CVE-2020-27873
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-072 // CNVD: CNVD-2022-06703 // JVNDB: JVNDB-2020-015835 // CNNVD: CNNVD-202102-384 // NVD: CVE-2020-27873 // NVD: CVE-2020-27873

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.0

problemtype:CWE-863

Trust: 1.0

problemtype:Bad authentication (CWE-863) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015835 // NVD: CVE-2020-27873

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202102-384

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-202102-384

PATCH

title:Security Advisory for Password Recovery Vulnerabilities on Some Routersurl:https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers

Trust: 1.5

title:Patch for NETGEAR R7450 Access Control Error Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/316146

Trust: 0.6

title:NETGEAR R7450 Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=140608

Trust: 0.6

sources: ZDI: ZDI-21-072 // CNVD: CNVD-2022-06703 // JVNDB: JVNDB-2020-015835 // CNNVD: CNNVD-202102-384

EXTERNAL IDS

db:NVDid:CVE-2020-27873

Trust: 3.8

db:ZDIid:ZDI-21-072

Trust: 3.2

db:JVNDBid:JVNDB-2020-015835

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-11559

Trust: 0.7

db:CNVDid:CNVD-2022-06703

Trust: 0.6

db:CNNVDid:CNNVD-202102-384

Trust: 0.6

db:VULMONid:CVE-2020-27873

Trust: 0.1

sources: ZDI: ZDI-21-072 // CNVD: CNVD-2022-06703 // VULMON: CVE-2020-27873 // JVNDB: JVNDB-2020-015835 // CNNVD: CNNVD-202102-384 // NVD: CVE-2020-27873

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-21-072/

Trust: 2.5

url:https://kb.netgear.com/000062641/security-advisory-for-password-recovery-vulnerabilities-on-some-routers

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-27873

Trust: 2.0

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/195043

Trust: 0.1

sources: ZDI: ZDI-21-072 // CNVD: CNVD-2022-06703 // VULMON: CVE-2020-27873 // JVNDB: JVNDB-2020-015835 // CNNVD: CNNVD-202102-384 // NVD: CVE-2020-27873

CREDITS

1sd3d of Viettel Cyber Security

Trust: 0.7

sources: ZDI: ZDI-21-072

SOURCES

db:ZDIid:ZDI-21-072
db:CNVDid:CNVD-2022-06703
db:VULMONid:CVE-2020-27873
db:JVNDBid:JVNDB-2020-015835
db:CNNVDid:CNNVD-202102-384
db:NVDid:CVE-2020-27873

LAST UPDATE DATE

2024-11-23T23:07:40.003000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-072date:2021-01-18T00:00:00
db:CNVDid:CNVD-2022-06703date:2022-01-25T00:00:00
db:VULMONid:CVE-2020-27873date:2021-02-08T00:00:00
db:JVNDBid:JVNDB-2020-015835date:2021-10-19T07:03:00
db:CNNVDid:CNNVD-202102-384date:2021-02-09T00:00:00
db:NVDid:CVE-2020-27873date:2024-11-21T05:21:58.680

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-072date:2021-01-18T00:00:00
db:CNVDid:CNVD-2022-06703date:2022-01-25T00:00:00
db:VULMONid:CVE-2020-27873date:2021-02-04T00:00:00
db:JVNDBid:JVNDB-2020-015835date:2021-10-19T00:00:00
db:CNNVDid:CNNVD-202102-384date:2021-02-04T00:00:00
db:NVDid:CVE-2020-27873date:2021-02-04T17:15:13.480