ID

VAR-202112-2223


CVE

CVE-2021-45498


TITLE

NETGEAR R6700v2  Vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2021-016968

DESCRIPTION

NETGEAR R6700v2 devices before 1.2.0.88 are affected by authentication bypass. NETGEAR R6700v2 There is an unspecified vulnerability in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. NETGEAR R6700v2 is a wireless router from Netgear. An attacker could exploit this vulnerability to bypass access control

Trust: 2.25

sources: NVD: CVE-2021-45498 // JVNDB: JVNDB-2021-016968 // CNVD: CNVD-2022-06692 // VULMON: CVE-2021-45498

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-06692

AFFECTED PRODUCTS

vendor:netgearmodel:r6700v2scope:ltversion:1.2.0.88

Trust: 1.6

vendor:ネットギアmodel:r6700v2scope:eqversion:r6700v2 firmware 1.2.0.88

Trust: 0.8

vendor:ネットギアmodel:r6700v2scope:eqversion: -

Trust: 0.8

sources: CNVD: CNVD-2022-06692 // JVNDB: JVNDB-2021-016968 // NVD: CVE-2021-45498

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45498
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2021-45498
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-45498
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2022-06692
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202112-2315
value: CRITICAL

Trust: 0.6

VULMON: CVE-2021-45498
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-45498
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2022-06692
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-45498
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45498
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-45498
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2022-06692 // VULMON: CVE-2021-45498 // JVNDB: JVNDB-2021-016968 // CNNVD: CNNVD-202112-2315 // NVD: CVE-2021-45498 // NVD: CVE-2021-45498

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-016968 // NVD: CVE-2021-45498

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2315

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202112-2315

PATCH

title:Security Advisory for Authentication Bypass on R6700v2, PSV-2018-0630url:https://kb.netgear.com/000064054/Security-Advisory-for-Authentication-Bypass-on-R6700v2-PSV-2018-0630

Trust: 0.8

title:Patch for NETGEAR R6700v2 Permission Permission and Access Control Issue Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/316171

Trust: 0.6

title:Netgear NETGEAR R6700v2 Remediation measures for authorization problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177068

Trust: 0.6

sources: CNVD: CNVD-2022-06692 // JVNDB: JVNDB-2021-016968 // CNNVD: CNNVD-202112-2315

EXTERNAL IDS

db:NVDid:CVE-2021-45498

Trust: 3.9

db:JVNDBid:JVNDB-2021-016968

Trust: 0.8

db:CNVDid:CNVD-2022-06692

Trust: 0.6

db:CNNVDid:CNNVD-202112-2315

Trust: 0.6

db:VULMONid:CVE-2021-45498

Trust: 0.1

sources: CNVD: CNVD-2022-06692 // VULMON: CVE-2021-45498 // JVNDB: JVNDB-2021-016968 // CNNVD: CNNVD-202112-2315 // NVD: CVE-2021-45498

REFERENCES

url:https://kb.netgear.com/000064054/security-advisory-for-authentication-bypass-on-r6700v2-psv-2018-0630

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45498

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-06692 // VULMON: CVE-2021-45498 // JVNDB: JVNDB-2021-016968 // CNNVD: CNNVD-202112-2315 // NVD: CVE-2021-45498

SOURCES

db:CNVDid:CNVD-2022-06692
db:VULMONid:CVE-2021-45498
db:JVNDBid:JVNDB-2021-016968
db:CNNVDid:CNNVD-202112-2315
db:NVDid:CVE-2021-45498

LAST UPDATE DATE

2024-11-23T21:58:37.303000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-06692date:2022-01-25T00:00:00
db:VULMONid:CVE-2021-45498date:2022-01-04T00:00:00
db:JVNDBid:JVNDB-2021-016968date:2022-12-27T05:25:00
db:CNNVDid:CNNVD-202112-2315date:2022-07-14T00:00:00
db:NVDid:CVE-2021-45498date:2024-11-21T06:32:20.877

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-06692date:2022-01-25T00:00:00
db:VULMONid:CVE-2021-45498date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-016968date:2022-12-27T00:00:00
db:CNNVDid:CNNVD-202112-2315date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45498date:2021-12-26T01:15:12.780