ID

VAR-202112-2274


CVE

CVE-2021-45675


TITLE

plural  NETGEAR  Cross-site scripting vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2021-017019

DESCRIPTION

Certain NETGEAR devices are affected by stored XSS. This affects R6120 before 1.0.0.76, R6260 before 1.1.0.78, R6850 before 1.1.0.78, R6350 before 1.1.0.78, R6330 before 1.1.0.78, R6800 before 1.2.0.76, R6700v2 before 1.2.0.76, R6900v2 before 1.2.0.76, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, and AC2600 before 1.2.0.76. plural NETGEAR A cross-site scripting vulnerability exists in the device.Information may be obtained and information may be tampered with. This affects R6120 prior to 1.0.0.76, R6260 prior to 1.1.0.78, R6850 prior to 1.1.0.78, R6350 prior to 1.1.0.78, R6330 prior to 1.1.0.78, R6800 prior to 1.2.0.76, R6700v2 prior to 1.2.0.76, R6900v2 prior to 1.2.0.76, R7200 prior to 1.2.0.76, R7350 prior to 1.2.0.76, R7400 prior to 1.2.0.76, R7450 prior to 1.2.0.76, AC2100 prior to 1.2.0.76, AC2400 prior to 1.2.0.76, and AC2600 prior to 1.2.0.76

Trust: 1.71

sources: NVD: CVE-2021-45675 // JVNDB: JVNDB-2021-017019 // VULMON: CVE-2021-45675

AFFECTED PRODUCTS

vendor:netgearmodel:r6900v2scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6120scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:ac2400scope:eqversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:ac2100scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r7400scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6330scope:ltversion:1.1.0.78

Trust: 1.0

vendor:netgearmodel:r7350scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6350scope:ltversion:1.1.0.78

Trust: 1.0

vendor:netgearmodel:ac2600scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r7450scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6700v2scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6850scope:ltversion:1.1.0.78

Trust: 1.0

vendor:netgearmodel:r6800scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r7200scope:ltversion:1.2.0.76

Trust: 1.0

vendor:netgearmodel:r6260scope:ltversion:1.1.0.78

Trust: 1.0

vendor:ネットギアmodel:r6350scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6700v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6900v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7350scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6260scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6120scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7200scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6330scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017019 // NVD: CVE-2021-45675

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45675
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2021-45675
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-45675
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202112-2471
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-45675
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-45675
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45675
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.7
impactScore: 2.7
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45675
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 0.6
impactScore: 4.7
version: 3.1

Trust: 1.0

NVD: CVE-2021-45675
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45675 // JVNDB: JVNDB-2021-017019 // CNNVD: CNNVD-202112-2471 // NVD: CVE-2021-45675 // NVD: CVE-2021-45675

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017019 // NVD: CVE-2021-45675

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2471

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202112-2471

PATCH

title:Security Advisory for Stored Cross Site Scripting on Some Routers, PSV-2020-0128url:https://kb.netgear.com/000064116/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2020-0128

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177028

Trust: 0.6

sources: JVNDB: JVNDB-2021-017019 // CNNVD: CNNVD-202112-2471

EXTERNAL IDS

db:NVDid:CVE-2021-45675

Trust: 3.3

db:JVNDBid:JVNDB-2021-017019

Trust: 0.8

db:CNNVDid:CNNVD-202112-2471

Trust: 0.6

db:VULMONid:CVE-2021-45675

Trust: 0.1

sources: VULMON: CVE-2021-45675 // JVNDB: JVNDB-2021-017019 // CNNVD: CNNVD-202112-2471 // NVD: CVE-2021-45675

REFERENCES

url:https://kb.netgear.com/000064116/security-advisory-for-stored-cross-site-scripting-on-some-routers-psv-2020-0128

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45675

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45675 // JVNDB: JVNDB-2021-017019 // CNNVD: CNNVD-202112-2471 // NVD: CVE-2021-45675

SOURCES

db:VULMONid:CVE-2021-45675
db:JVNDBid:JVNDB-2021-017019
db:CNNVDid:CNNVD-202112-2471
db:NVDid:CVE-2021-45675

LAST UPDATE DATE

2024-11-23T22:15:58.722000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45675date:2022-01-05T00:00:00
db:JVNDBid:JVNDB-2021-017019date:2022-12-27T08:48:00
db:CNNVDid:CNNVD-202112-2471date:2022-01-06T00:00:00
db:NVDid:CVE-2021-45675date:2024-11-21T06:32:51.277

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45675date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017019date:2022-12-27T00:00:00
db:CNNVDid:CNNVD-202112-2471date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45675date:2021-12-26T01:15:21.240