ID

VAR-202108-1622


CVE

CVE-2021-38516


TITLE

Multiple Netgear Product security vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202108-961

DESCRIPTION

Certain NETGEAR devices are affected by lack of access control at the function level. This affects D6220 before 1.0.0.48, D6400 before 1.0.0.82, D7000v2 before 1.0.0.52, D7800 before 1.0.1.44, D8500 before 1.0.3.43, DC112A before 1.0.0.40, DGN2200v4 before 1.0.0.108, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK40 before 2.3.0.28, RBR40 before 2.3.0.28, RBS40 before 2.3.0.28, R6020 before 1.0.0.34, R6080 before 1.0.0.34, R6120 before 1.0.0.44, R6220 before 1.1.0.80, R6230 before 1.1.0.80, R6250 before 1.0.4.34, R6260 before 1.1.0.40, R6850 before 1.1.0.40, R6350 before 1.1.0.40, R6400v2 before 1.0.2.62, R6700v3 before 1.0.2.62, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900v2 before 1.2.0.36, R7000 before 1.0.9.34, R6900P before 1.3.1.44, R7000P before 1.3.1.44, R7100LG before 1.0.0.48, R7200 before 1.2.0.48, R7350 before 1.2.0.48, R7400 before 1.2.0.48, R7450 before 1.2.0.36, AC2100 before 1.2.0.36, AC2400 before 1.2.0.36, AC2600 before 1.2.0.36, R7500v2 before 1.0.3.38, R7800 before 1.0.2.58, R7900 before 1.0.3.8, R7960P before 1.4.1.44, R8000 before 1.0.4.28, R7900P before 1.4.1.30, R8000P before 1.4.1.30, R8900 before 1.0.4.2, R9000 before 1.0.4.2, RAX120 before 1.0.0.74, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, WNR3500Lv2 before 1.2.0.56, XR450 before 2.3.2.32, and XR500 before 2.3.2.32. This affects D6220 prior to 1.0.0.48, D6400 prior to 1.0.0.82, D7000v2 prior to 1.0.0.52, D7800 prior to 1.0.1.44, D8500 prior to 1.0.3.43, DC112A prior to 1.0.0.40, DGN2200v4 prior to 1.0.0.108, RBK50 prior to 2.3.0.32, RBR50 prior to 2.3.0.32, RBS50 prior to 2.3.0.32, RBK20 prior to 2.3.0.28, RBR20 prior to 2.3.0.28, RBS20 prior to 2.3.0.28, RBK40 prior to 2.3.0.28, RBR40 prior to 2.3.0.28, RBS40 prior to 2.3.0.28, R6020 prior to 1.0.0.34, R6080 prior to 1.0.0.34, R6120 prior to 1.0.0.44, R6220 prior to 1.1.0.80, R6230 prior to 1.1.0.80, R6250 prior to 1.0.4.34, R6260 prior to 1.1.0.40, R6850 prior to 1.1.0.40, R6350 prior to 1.1.0.40, R6400v2 prior to 1.0.2.62, R6700v3 prior to 1.0.2.62, R6700v2 prior to 1.2.0.36, R6800 prior to 1.2.0.36, R6900v2 prior to 1.2.0.36, R7000 prior to 1.0.9.34, R6900P prior to 1.3.1.44, R7000P prior to 1.3.1.44, R7100LG prior to 1.0.0.48, R7200 prior to 1.2.0.48, R7350 prior to 1.2.0.48, R7400 prior to 1.2.0.48, R7450 prior to 1.2.0.36, AC2100 prior to 1.2.0.36, AC2400 prior to 1.2.0.36, AC2600 prior to 1.2.0.36, R7500v2 prior to 1.0.3.38, R7800 prior to 1.0.2.58, R7900 prior to 1.0.3.8, R7960P prior to 1.4.1.44, R8000 prior to 1.0.4.28, R7900P prior to 1.4.1.30, R8000P prior to 1.4.1.30, R8900 prior to 1.0.4.2, R9000 prior to 1.0.4.2, RAX120 prior to 1.0.0.74, RBK752 prior to 3.2.16.6, RBR750 prior to 3.2.16.6, RBS750 prior to 3.2.16.6, RBK852 prior to 3.2.16.6, RBR850 prior to 3.2.16.6, RBS850 prior to 3.2.16.6, WNR3500Lv2 prior to 1.2.0.56, XR450 prior to 2.3.2.32, and XR500 prior to 2.3.2.32

Trust: 0.99

sources: NVD: CVE-2021-38516 // VULMON: CVE-2021-38516

AFFECTED PRODUCTS

vendor:netgearmodel:r6080scope:ltversion:1.0.0.34

Trust: 1.0

vendor:netgearmodel:r8900scope:ltversion:1.0.4.2

Trust: 1.0

vendor:netgearmodel:d7800scope:ltversion:1.0.1.44

Trust: 1.0

vendor:netgearmodel:rbk50scope:ltversion:2.3.0.32

Trust: 1.0

vendor:netgearmodel:rbs40scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.2.62

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:ac2600scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.48

Trust: 1.0

vendor:netgearmodel:r7900scope:ltversion:1.0.3.8

Trust: 1.0

vendor:netgearmodel:r6220scope:ltversion:1.1.0.80

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.9.34

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.1.44

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.82

Trust: 1.0

vendor:netgearmodel:d7000scope:ltversion:1.0.0.52

Trust: 1.0

vendor:netgearmodel:r6800scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:rbr40scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:rbr50scope:ltversion:2.3.0.32

Trust: 1.0

vendor:netgearmodel:rax120scope:ltversion:1.0.0.74

Trust: 1.0

vendor:netgearmodel:dc112ascope:ltversion:1.0.0.40

Trust: 1.0

vendor:netgearmodel:ac2100scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r6250scope:ltversion:1.0.4.34

Trust: 1.0

vendor:netgearmodel:dgn2200scope:ltversion:1.0.0.108

Trust: 1.0

vendor:netgearmodel:d8500scope:ltversion:1.0.3.43

Trust: 1.0

vendor:netgearmodel:r6120scope:ltversion:1.0.0.44

Trust: 1.0

vendor:netgearmodel:r7500scope:ltversion:1.0.3.38

Trust: 1.0

vendor:netgearmodel:r7200scope:ltversion:1.2.0.48

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.28

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.0.2.62

Trust: 1.0

vendor:netgearmodel:rbk20scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:rbk40scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.1.30

Trust: 1.0

vendor:netgearmodel:xr500scope:ltversion:2.3.2.32

Trust: 1.0

vendor:netgearmodel:rbs50scope:ltversion:2.3.0.32

Trust: 1.0

vendor:netgearmodel:r6230scope:ltversion:1.1.0.80

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:r7450scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:ac2400scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.1.44

Trust: 1.0

vendor:netgearmodel:r6350scope:ltversion:1.1.0.40

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r9000scope:ltversion:1.0.4.2

Trust: 1.0

vendor:netgearmodel:xr450scope:ltversion:2.3.2.32

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.1.44

Trust: 1.0

vendor:netgearmodel:rbr750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r7400scope:ltversion:1.2.0.48

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.48

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.1.30

Trust: 1.0

vendor:netgearmodel:r7350scope:ltversion:1.2.0.48

Trust: 1.0

vendor:netgearmodel:rbr20scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:rbs20scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:r6020scope:ltversion:1.0.0.34

Trust: 1.0

vendor:netgearmodel:r6260scope:ltversion:1.1.0.40

Trust: 1.0

vendor:netgearmodel:r6850scope:ltversion:1.1.0.40

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.2.0.36

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:wnr3500lscope:ltversion:1.2.0.56

Trust: 1.0

vendor:netgearmodel:r7800scope:ltversion:1.0.2.58

Trust: 1.0

sources: NVD: CVE-2021-38516

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-38516
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2021-38516
value: CRITICAL

Trust: 1.0

CNNVD: CNNVD-202108-961
value: CRITICAL

Trust: 0.6

VULMON: CVE-2021-38516
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-38516
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2021-38516
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-38516
baseSeverity: CRITICAL
baseScore: 10.0
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 6.0
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2021-38516 // CNNVD: CNNVD-202108-961 // NVD: CVE-2021-38516 // NVD: CVE-2021-38516

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2021-38516

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202108-961

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202108-961

PATCH

title:Multiple Netgear Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159355

Trust: 0.6

title:CVE-2021-38516url:https://github.com/AlAIAL90/CVE-2021-38516

Trust: 0.1

sources: VULMON: CVE-2021-38516 // CNNVD: CNNVD-202108-961

EXTERNAL IDS

db:NVDid:CVE-2021-38516

Trust: 1.7

db:CNNVDid:CNNVD-202108-961

Trust: 0.6

db:VULMONid:CVE-2021-38516

Trust: 0.1

sources: VULMON: CVE-2021-38516 // CNNVD: CNNVD-202108-961 // NVD: CVE-2021-38516

REFERENCES

url:https://kb.netgear.com/000063780/security-advisory-for-missing-function-level-access-control-on-some-routers-gateways-and-wifi-systems-psv-2020-0273

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-38516

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/863.html

Trust: 0.1

url:https://github.com/alaial90/cve-2021-38516

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-38516 // CNNVD: CNNVD-202108-961 // NVD: CVE-2021-38516

SOURCES

db:VULMONid:CVE-2021-38516
db:CNNVDid:CNNVD-202108-961
db:NVDid:CVE-2021-38516

LAST UPDATE DATE

2024-08-14T14:03:05.803000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-38516date:2021-08-19T00:00:00
db:CNNVDid:CNNVD-202108-961date:2022-07-14T00:00:00
db:NVDid:CVE-2021-38516date:2022-07-12T17:42:04.277

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-38516date:2021-08-11T00:00:00
db:CNNVDid:CNNVD-202108-961date:2021-08-10T00:00:00
db:NVDid:CVE-2021-38516date:2021-08-11T00:15:25.580