ID

VAR-202103-1278


CVE

CVE-2021-29075


TITLE

plural  NETGEAR  Out-of-bounds write vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-004581

DESCRIPTION

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects RBW30 before 2.6.2.2, RBK852 before 3.2.17.12, RBK852 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12. plural NETGEAR The device contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This affects RBW30 prior to 2.6.2.2, RBK852 prior to 3.2.17.12, RBK852 prior to 3.2.17.12, RBK852 prior to 3.2.17.12, RBR850 prior to 3.2.17.12, RBS850 prior to 3.2.17.12, RBK752 prior to 3.2.17.12, RBK753 prior to 3.2.17.12, RBK753S prior to 3.2.17.12, RBK754 prior to 3.2.17.12, RBR750 prior to 3.2.17.12, and RBS750 prior to 3.2.17.12

Trust: 1.71

sources: NVD: CVE-2021-29075 // JVNDB: JVNDB-2021-004581 // VULMON: CVE-2021-29075

AFFECTED PRODUCTS

vendor:netgearmodel:rbr750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk753scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk754scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbw30scope:ltversion:2.6.2.2

Trust: 1.0

vendor:netgearmodel:rbk853scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk753sscope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk854scope:ltversion:3.2.17.12

Trust: 1.0

vendor:ネットギアmodel:rbk852scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk753sscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk853scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbw30scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk854scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk752scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk753scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk754scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-004581 // NVD: CVE-2021-29075

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-29075
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-29075
value: HIGH

Trust: 1.0

NVD: CVE-2021-29075
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202103-1352
value: HIGH

Trust: 0.6

VULMON: CVE-2021-29075
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-29075
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-29075
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.7
impactScore: 6.0
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-004581
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-29075 // JVNDB: JVNDB-2021-004581 // CNNVD: CNNVD-202103-1352 // NVD: CVE-2021-29075 // NVD: CVE-2021-29075

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-004581 // NVD: CVE-2021-29075

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202103-1352

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202103-1352

PATCH

title:Security Advisory for Post-Authentication Stack Overflow on Some WiFi Systems, PSV-2020-0466url:https://kb.netgear.com/000063010/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0466

Trust: 0.8

title:NETGEAR Repair measures for buffer errors and vulnerabilities in many productsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=144970

Trust: 0.6

sources: JVNDB: JVNDB-2021-004581 // CNNVD: CNNVD-202103-1352

EXTERNAL IDS

db:NVDid:CVE-2021-29075

Trust: 2.5

db:JVNDBid:JVNDB-2021-004581

Trust: 0.8

db:CNNVDid:CNNVD-202103-1352

Trust: 0.6

db:VULMONid:CVE-2021-29075

Trust: 0.1

sources: VULMON: CVE-2021-29075 // JVNDB: JVNDB-2021-004581 // CNNVD: CNNVD-202103-1352 // NVD: CVE-2021-29075

REFERENCES

url:https://kb.netgear.com/000063010/security-advisory-for-post-authentication-stack-overflow-on-some-wifi-systems-psv-2020-0466

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-29075

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-29075 // JVNDB: JVNDB-2021-004581 // CNNVD: CNNVD-202103-1352 // NVD: CVE-2021-29075

SOURCES

db:VULMONid:CVE-2021-29075
db:JVNDBid:JVNDB-2021-004581
db:CNNVDid:CNNVD-202103-1352
db:NVDid:CVE-2021-29075

LAST UPDATE DATE

2024-11-23T22:33:06.417000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-29075date:2021-03-24T00:00:00
db:JVNDBid:JVNDB-2021-004581date:2021-11-25T03:10:00
db:CNNVDid:CNNVD-202103-1352date:2021-08-16T00:00:00
db:NVDid:CVE-2021-29075date:2024-11-21T06:00:39.567

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-29075date:2021-03-23T00:00:00
db:JVNDBid:JVNDB-2021-004581date:2021-11-25T00:00:00
db:CNNVDid:CNNVD-202103-1352date:2021-03-23T00:00:00
db:NVDid:CVE-2021-29075date:2021-03-23T07:15:13.857