ID

VAR-202103-0893


CVE

CVE-2021-27273


TITLE

NETGEAR ProSAFE Network Management System  In  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-004809

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SettingConfigController class. When parsing the fileName parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12121. Zero Day Initiative To this vulnerability ZDI-CAN-12121 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Netgear NETGEAR is a router made by Netgear. A hardware device that connects two or more networks, acting as a gateway between the networks

Trust: 2.43

sources: NVD: CVE-2021-27273 // JVNDB: JVNDB-2021-004809 // ZDI: ZDI-21-356 // VULHUB: VHN-386506 // VULMON: CVE-2021-27273

AFFECTED PRODUCTS

vendor:netgearmodel:prosafe network management systemscope:eqversion:1.6.0.26

Trust: 1.0

vendor:ネットギアmodel:prosafe network management systemscope:eqversion:1.6.0.26

Trust: 0.8

vendor:ネットギアmodel:prosafe network management systemscope:eqversion: -

Trust: 0.8

vendor:netgearmodel:prosafe network management systemscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-356 // JVNDB: JVNDB-2021-004809 // NVD: CVE-2021-27273

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27273
value: HIGH

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2021-27273
value: HIGH

Trust: 1.0

NVD: CVE-2021-27273
value: HIGH

Trust: 0.8

ZDI: CVE-2021-27273
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202103-1560
value: HIGH

Trust: 0.6

VULHUB: VHN-386506
value: HIGH

Trust: 0.1

VULMON: CVE-2021-27273
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-27273
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-386506
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

zdi-disclosures@trendmicro.com: CVE-2021-27273
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2021-27273
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2021-27273
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-356 // VULHUB: VHN-386506 // VULMON: CVE-2021-27273 // JVNDB: JVNDB-2021-004809 // CNNVD: CNNVD-202103-1560 // NVD: CVE-2021-27273 // NVD: CVE-2021-27273

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:OS Command injection (CWE-78) [ Other ]

Trust: 0.8

sources: VULHUB: VHN-386506 // JVNDB: JVNDB-2021-004809 // NVD: CVE-2021-27273

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202103-1560

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202103-1560

PATCH

title:Security Advisory for Post-Authentication Command Injection on NMS300, PSV-2020-0559url:https://kb.netgear.com/000062686/Security-Advisory-for-Post-Authentication-Command-Injection-on-NMS300-PSV-2020-0559

Trust: 1.5

title:NETGEAR ProSAFE Network Management System Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=145792

Trust: 0.6

sources: ZDI: ZDI-21-356 // JVNDB: JVNDB-2021-004809 // CNNVD: CNNVD-202103-1560

EXTERNAL IDS

db:NVDid:CVE-2021-27273

Trust: 3.3

db:ZDIid:ZDI-21-356

Trust: 3.3

db:JVNDBid:JVNDB-2021-004809

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-12121

Trust: 0.7

db:CNNVDid:CNNVD-202103-1560

Trust: 0.7

db:VULHUBid:VHN-386506

Trust: 0.1

db:VULMONid:CVE-2021-27273

Trust: 0.1

sources: ZDI: ZDI-21-356 // VULHUB: VHN-386506 // VULMON: CVE-2021-27273 // JVNDB: JVNDB-2021-004809 // CNNVD: CNNVD-202103-1560 // NVD: CVE-2021-27273

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-21-356/

Trust: 3.2

url:https://kb.netgear.com/000062686/security-advisory-for-post-authentication-command-injection-on-nms300-psv-2020-0559

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-27273

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/198893

Trust: 0.1

sources: ZDI: ZDI-21-356 // VULHUB: VHN-386506 // VULMON: CVE-2021-27273 // JVNDB: JVNDB-2021-004809 // CNNVD: CNNVD-202103-1560 // NVD: CVE-2021-27273

CREDITS

rgod

Trust: 0.7

sources: ZDI: ZDI-21-356

SOURCES

db:ZDIid:ZDI-21-356
db:VULHUBid:VHN-386506
db:VULMONid:CVE-2021-27273
db:JVNDBid:JVNDB-2021-004809
db:CNNVDid:CNNVD-202103-1560
db:NVDid:CVE-2021-27273

LAST UPDATE DATE

2024-11-23T23:04:04.896000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-356date:2021-03-26T00:00:00
db:VULHUBid:VHN-386506date:2021-03-30T00:00:00
db:VULMONid:CVE-2021-27273date:2021-03-30T00:00:00
db:JVNDBid:JVNDB-2021-004809date:2021-11-30T08:35:00
db:CNNVDid:CNNVD-202103-1560date:2021-03-31T00:00:00
db:NVDid:CVE-2021-27273date:2024-11-21T05:57:44.357

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-356date:2021-03-26T00:00:00
db:VULHUBid:VHN-386506date:2021-03-29T00:00:00
db:VULMONid:CVE-2021-27273date:2021-03-29T00:00:00
db:JVNDBid:JVNDB-2021-004809date:2021-11-30T00:00:00
db:CNNVDid:CNNVD-202103-1560date:2021-03-26T00:00:00
db:NVDid:CVE-2021-27273date:2021-03-29T21:15:13.093