ID

VAR-202112-2279


CVE

CVE-2021-45670


TITLE

plural  NETGEAR  Cross-site scripting vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2021-017168

DESCRIPTION

Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7000 before 1.0.11.116, R7900 before 1.0.4.38, R8000 before 1.0.4.68, RAX200 before 1.0.3.106, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, EX3700 before 1.0.0.90, MR60 before 1.0.6.110, R7000P before 1.3.2.126, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, EX3800 before 1.0.0.90, MS60 before 1.0.6.110, R6900P before 1.3.2.126, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. plural NETGEAR A cross-site scripting vulnerability exists in the device.Information may be obtained and information may be tampered with. This affects CBR40 prior to 2.5.0.10, EAX20 prior to 1.0.0.48, EAX80 prior to 1.0.1.64, EX6120 prior to 1.0.0.64, EX6130 prior to 1.0.0.44, EX7500 prior to 1.0.0.72, R7000 prior to 1.0.11.116, R7900 prior to 1.0.4.38, R8000 prior to 1.0.4.68, RAX200 prior to 1.0.3.106, RBS40V prior to 2.6.1.4, RBW30 prior to 2.6.1.4, EX3700 prior to 1.0.0.90, MR60 prior to 1.0.6.110, R7000P prior to 1.3.2.126, RAX20 prior to 1.0.2.82, RAX45 prior to 1.0.2.72, RAX80 prior to 1.0.3.106, EX3800 prior to 1.0.0.90, MS60 prior to 1.0.6.110, R6900P prior to 1.3.2.126, RAX15 prior to 1.0.2.82, RAX50 prior to 1.0.2.72, RAX75 prior to 1.0.3.106, RBR750 prior to 3.2.16.6, RBR850 prior to 3.2.16.6, RBS750 prior to 3.2.16.6, RBS850 prior to 3.2.16.6, RBK752 prior to 3.2.16.6, and RBK852 prior to 3.2.16.6

Trust: 1.71

sources: NVD: CVE-2021-45670 // JVNDB: JVNDB-2021-017168 // VULMON: CVE-2021-45670

AFFECTED PRODUCTS

vendor:netgearmodel:rbs40vscope:ltversion:2.6.1.4

Trust: 1.0

vendor:netgearmodel:rax45scope:ltversion:1.0.2.72

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r7900scope:ltversion:1.0.4.38

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:ex6120scope:ltversion:1.0.0.64

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.68

Trust: 1.0

vendor:netgearmodel:rax20scope:ltversion:1.0.2.82

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:mr60scope:ltversion:1.0.6.110

Trust: 1.0

vendor:netgearmodel:ex6130scope:ltversion:1.0.0.44

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.2.126

Trust: 1.0

vendor:netgearmodel:ms60scope:ltversion:1.0.6.110

Trust: 1.0

vendor:netgearmodel:ex7500scope:ltversion:1.0.0.72

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.116

Trust: 1.0

vendor:netgearmodel:eax20scope:ltversion:1.0.0.48

Trust: 1.0

vendor:netgearmodel:eax80scope:ltversion:1.0.1.64

Trust: 1.0

vendor:netgearmodel:ex3700scope:ltversion:1.0.0.90

Trust: 1.0

vendor:netgearmodel:rbw30scope:ltversion:2.6.1.4

Trust: 1.0

vendor:netgearmodel:rax15scope:ltversion:1.0.2.82

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:ex3800scope:ltversion:1.0.0.90

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.2.126

Trust: 1.0

vendor:netgearmodel:rbr750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rax50scope:ltversion:1.0.2.72

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:cbr40scope:ltversion:2.5.0.10

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.3.106

Trust: 1.0

vendor:ネットギアmodel:rax15scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax45scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax50scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax75scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:mr60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ms60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax200scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017168 // NVD: CVE-2021-45670

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45670
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2021-45670
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-45670
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202112-2469
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-45670
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-45670
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45670
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.7
impactScore: 2.7
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45670
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:L
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: LOW
exploitabilityScore: 0.7
impactScore: 5.3
version: 3.1

Trust: 1.0

NVD: CVE-2021-45670
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45670 // JVNDB: JVNDB-2021-017168 // CNNVD: CNNVD-202112-2469 // NVD: CVE-2021-45670 // NVD: CVE-2021-45670

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017168 // NVD: CVE-2021-45670

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2469

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202112-2469

PATCH

title:Security Advisory for Stored Cross Site Scripting on Some Routers, Extenders, and WiFi Systems, PSV-2020-0255url:https://kb.netgear.com/000064480/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0255

Trust: 0.8

title:Netgear RBR750 and NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=175892

Trust: 0.6

sources: JVNDB: JVNDB-2021-017168 // CNNVD: CNNVD-202112-2469

EXTERNAL IDS

db:NVDid:CVE-2021-45670

Trust: 3.3

db:JVNDBid:JVNDB-2021-017168

Trust: 0.8

db:CNNVDid:CNNVD-202112-2469

Trust: 0.6

db:VULMONid:CVE-2021-45670

Trust: 0.1

sources: VULMON: CVE-2021-45670 // JVNDB: JVNDB-2021-017168 // CNNVD: CNNVD-202112-2469 // NVD: CVE-2021-45670

REFERENCES

url:https://kb.netgear.com/000064480/security-advisory-for-stored-cross-site-scripting-on-some-routers-extenders-and-wifi-systems-psv-2020-0255

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45670

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45670 // JVNDB: JVNDB-2021-017168 // CNNVD: CNNVD-202112-2469 // NVD: CVE-2021-45670

SOURCES

db:VULMONid:CVE-2021-45670
db:JVNDBid:JVNDB-2021-017168
db:CNNVDid:CNNVD-202112-2469
db:NVDid:CVE-2021-45670

LAST UPDATE DATE

2024-11-23T22:36:59.332000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45670date:2022-01-06T00:00:00
db:JVNDBid:JVNDB-2021-017168date:2023-01-06T05:10:00
db:CNNVDid:CNNVD-202112-2469date:2022-01-07T00:00:00
db:NVDid:CVE-2021-45670date:2024-11-21T06:32:50.360

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45670date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017168date:2023-01-06T00:00:00
db:CNNVDid:CNNVD-202112-2469date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45670date:2021-12-26T01:15:21.007