ID

VAR-202103-1275


CVE

CVE-2021-29072


TITLE

plural  NETGEAR  Command injection vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2021-004578

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This affects RBK852 prior to 3.2.17.12, RBK853 prior to 3.2.17.12, RBK854 prior to 3.2.17.12, RBR850 prior to 3.2.17.12, and RBS850 prior to 3.2.17.12

Trust: 1.71

sources: NVD: CVE-2021-29072 // JVNDB: JVNDB-2021-004578 // VULMON: CVE-2021-29072

AFFECTED PRODUCTS

vendor:netgearmodel:rbk853scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk854scope:ltversion:3.2.17.12

Trust: 1.0

vendor:ネットギアmodel:rbk852scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk853scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk854scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs850scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-004578 // NVD: CVE-2021-29072

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-29072
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-29072
value: HIGH

Trust: 1.0

NVD: CVE-2021-29072
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202103-1354
value: HIGH

Trust: 0.6

VULMON: CVE-2021-29072
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-29072
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-29072
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.7
impactScore: 6.0
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-004578
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-29072 // JVNDB: JVNDB-2021-004578 // CNNVD: CNNVD-202103-1354 // NVD: CVE-2021-29072 // NVD: CVE-2021-29072

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-004578 // NVD: CVE-2021-29072

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202103-1354

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202103-1354

PATCH

title:Security Advisory for Post-Authentication Command Injection on Some WiFi Systems, PSV-2020-0493url:https://kb.netgear.com/000063018/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0493

Trust: 0.8

title:Certain NETGEAR Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=144972

Trust: 0.6

sources: JVNDB: JVNDB-2021-004578 // CNNVD: CNNVD-202103-1354

EXTERNAL IDS

db:NVDid:CVE-2021-29072

Trust: 2.5

db:JVNDBid:JVNDB-2021-004578

Trust: 0.8

db:CNNVDid:CNNVD-202103-1354

Trust: 0.6

db:VULMONid:CVE-2021-29072

Trust: 0.1

sources: VULMON: CVE-2021-29072 // JVNDB: JVNDB-2021-004578 // CNNVD: CNNVD-202103-1354 // NVD: CVE-2021-29072

REFERENCES

url:https://kb.netgear.com/000063018/security-advisory-for-post-authentication-command-injection-on-some-wifi-systems-psv-2020-0493

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-29072

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-29072 // JVNDB: JVNDB-2021-004578 // CNNVD: CNNVD-202103-1354 // NVD: CVE-2021-29072

SOURCES

db:VULMONid:CVE-2021-29072
db:JVNDBid:JVNDB-2021-004578
db:CNNVDid:CNNVD-202103-1354
db:NVDid:CVE-2021-29072

LAST UPDATE DATE

2024-11-23T23:07:37.983000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-29072date:2021-03-24T00:00:00
db:JVNDBid:JVNDB-2021-004578date:2021-11-25T03:10:00
db:CNNVDid:CNNVD-202103-1354date:2021-08-16T00:00:00
db:NVDid:CVE-2021-29072date:2024-11-21T06:00:39.080

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-29072date:2021-03-23T00:00:00
db:JVNDBid:JVNDB-2021-004578date:2021-11-25T00:00:00
db:CNNVDid:CNNVD-202103-1354date:2021-03-23T00:00:00
db:NVDid:CVE-2021-29072date:2021-03-23T07:15:13.640