ID

VAR-202103-1277


CVE

CVE-2021-29074


TITLE

plural  NETGEAR  Out-of-bounds write vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-004580

DESCRIPTION

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects RBW30 before 2.6.2.2, RBK852 before 3.2.17.12, RBK853 before 3.2.17.12, RBK854 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12. plural NETGEAR The device contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This affects RBW30 prior to 2.6.2.2, RBK852 prior to 3.2.17.12, RBK853 prior to 3.2.17.12, RBK854 prior to 3.2.17.12, RBR850 prior to 3.2.17.12, RBS850 prior to 3.2.17.12, RBK752 prior to 3.2.17.12, RBK753 prior to 3.2.17.12, RBK753S prior to 3.2.17.12, RBK754 prior to 3.2.17.12, RBR750 prior to 3.2.17.12, and RBS750 prior to 3.2.17.12

Trust: 1.71

sources: NVD: CVE-2021-29074 // JVNDB: JVNDB-2021-004580 // VULMON: CVE-2021-29074

AFFECTED PRODUCTS

vendor:netgearmodel:rbr750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk753scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk754scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbw30scope:ltversion:2.6.2.2

Trust: 1.0

vendor:netgearmodel:rbk853scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk753sscope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk854scope:ltversion:3.2.17.12

Trust: 1.0

vendor:ネットギアmodel:rbk852scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk753sscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk853scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbw30scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk854scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk752scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk753scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk754scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-004580 // NVD: CVE-2021-29074

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-29074
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-29074
value: HIGH

Trust: 1.0

NVD: CVE-2021-29074
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202103-1350
value: HIGH

Trust: 0.6

VULMON: CVE-2021-29074
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-29074
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-29074
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.7
impactScore: 6.0
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-004580
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-29074 // JVNDB: JVNDB-2021-004580 // CNNVD: CNNVD-202103-1350 // NVD: CVE-2021-29074 // NVD: CVE-2021-29074

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-004580 // NVD: CVE-2021-29074

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202103-1350

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202103-1350

PATCH

title:Security Advisory for Post-Authentication Stack Overflow on Some WiFi Routers, PSV-2020-0467url:https://kb.netgear.com/000063011/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Routers-PSV-2020-0467

Trust: 0.8

title:NETGEAR Repair measures for buffer errors and vulnerabilities in many productsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=145889

Trust: 0.6

sources: JVNDB: JVNDB-2021-004580 // CNNVD: CNNVD-202103-1350

EXTERNAL IDS

db:NVDid:CVE-2021-29074

Trust: 2.5

db:JVNDBid:JVNDB-2021-004580

Trust: 0.8

db:CNNVDid:CNNVD-202103-1350

Trust: 0.6

db:VULMONid:CVE-2021-29074

Trust: 0.1

sources: VULMON: CVE-2021-29074 // JVNDB: JVNDB-2021-004580 // CNNVD: CNNVD-202103-1350 // NVD: CVE-2021-29074

REFERENCES

url:https://kb.netgear.com/000063011/security-advisory-for-post-authentication-stack-overflow-on-some-wifi-routers-psv-2020-0467

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-29074

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-29074 // JVNDB: JVNDB-2021-004580 // CNNVD: CNNVD-202103-1350 // NVD: CVE-2021-29074

SOURCES

db:VULMONid:CVE-2021-29074
db:JVNDBid:JVNDB-2021-004580
db:CNNVDid:CNNVD-202103-1350
db:NVDid:CVE-2021-29074

LAST UPDATE DATE

2024-11-23T23:11:06.765000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-29074date:2021-03-24T00:00:00
db:JVNDBid:JVNDB-2021-004580date:2021-11-25T03:10:00
db:CNNVDid:CNNVD-202103-1350date:2021-03-31T00:00:00
db:NVDid:CVE-2021-29074date:2024-11-21T06:00:39.400

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-29074date:2021-03-23T00:00:00
db:JVNDBid:JVNDB-2021-004580date:2021-11-25T00:00:00
db:CNNVDid:CNNVD-202103-1350date:2021-03-23T00:00:00
db:NVDid:CVE-2021-29074date:2021-03-23T07:15:13.797