ID

VAR-202112-2282


CVE

CVE-2021-45667


TITLE

plural  NETGEAR  Cross-site scripting vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2021-017172

DESCRIPTION

Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7960P before 1.4.1.66, RAX200 before 1.0.3.106, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, EX3700 before 1.0.0.90, MR60 before 1.0.6.110, R8000P before 1.4.1.66, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, EX3800 before 1.0.0.90, MS60 before 1.0.6.110, R7900P before 1.4.1.66, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. plural NETGEAR A cross-site scripting vulnerability exists in the device.Information may be obtained and information may be tampered with. This affects CBR40 prior to 2.5.0.10, EAX20 prior to 1.0.0.48, EAX80 prior to 1.0.1.64, EX6120 prior to 1.0.0.64, EX6130 prior to 1.0.0.44, EX7500 prior to 1.0.0.72, R7960P prior to 1.4.1.66, RAX200 prior to 1.0.3.106, RBS40V prior to 2.6.1.4, RBW30 prior to 2.6.1.4, EX3700 prior to 1.0.0.90, MR60 prior to 1.0.6.110, R8000P prior to 1.4.1.66, RAX20 prior to 1.0.2.82, RAX45 prior to 1.0.2.72, RAX80 prior to 1.0.3.106, EX3800 prior to 1.0.0.90, MS60 prior to 1.0.6.110, R7900P prior to 1.4.1.66, RAX15 prior to 1.0.2.82, RAX50 prior to 1.0.2.72, RAX75 prior to 1.0.3.106, RBR750 prior to 3.2.16.6, RBR850 prior to 3.2.16.6, RBS750 prior to 3.2.16.6, RBS850 prior to 3.2.16.6, RBK752 prior to 3.2.16.6, and RBK852 prior to 3.2.16.6

Trust: 1.71

sources: NVD: CVE-2021-45667 // JVNDB: JVNDB-2021-017172 // VULMON: CVE-2021-45667

AFFECTED PRODUCTS

vendor:netgearmodel:rbs40vscope:ltversion:2.6.1.4

Trust: 1.0

vendor:netgearmodel:rax45scope:ltversion:1.0.2.72

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rax50scope:lteversion:1.0.2.72

Trust: 1.0

vendor:netgearmodel:ex6120scope:ltversion:1.0.0.64

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:rax20scope:ltversion:1.0.2.82

Trust: 1.0

vendor:netgearmodel:ex6130scope:ltversion:1.0.0.44

Trust: 1.0

vendor:netgearmodel:mr60scope:ltversion:1.0.6.110

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:ms60scope:ltversion:1.0.6.110

Trust: 1.0

vendor:netgearmodel:ex7500scope:ltversion:1.0.0.72

Trust: 1.0

vendor:netgearmodel:eax20scope:ltversion:1.0.0.48

Trust: 1.0

vendor:netgearmodel:eax80scope:ltversion:1.0.1.64

Trust: 1.0

vendor:netgearmodel:rbw30scope:ltversion:2.6.1.4

Trust: 1.0

vendor:netgearmodel:ex3700scope:ltversion:1.0.0.90

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.1.66

Trust: 1.0

vendor:netgearmodel:rax15scope:ltversion:1.0.2.82

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.1.66

Trust: 1.0

vendor:netgearmodel:ex3800scope:ltversion:1.0.0.90

Trust: 1.0

vendor:netgearmodel:rbr750scope:ltversion:3.2.16.6

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:cbr40scope:ltversion:2.5.0.10

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.1.66

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.3.106

Trust: 1.0

vendor:ネットギアmodel:ex7500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6120scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7960pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:eax20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:eax80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6130scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs40vscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbw30scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbr40scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax200scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017172 // NVD: CVE-2021-45667

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45667
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2021-45667
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-45667
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202112-2463
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-45667
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-45667
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45667
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 1.7
impactScore: 2.7
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45667
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:L
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: LOW
exploitabilityScore: 0.7
impactScore: 5.3
version: 3.1

Trust: 1.0

NVD: CVE-2021-45667
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45667 // JVNDB: JVNDB-2021-017172 // CNNVD: CNNVD-202112-2463 // NVD: CVE-2021-45667 // NVD: CVE-2021-45667

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017172 // NVD: CVE-2021-45667

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2463

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202112-2463

PATCH

title:Security Advisory for Stored Cross Site Scripting on Some Router, Extenders, and WiFi Systems, PSV-2020-0256url:https://kb.netgear.com/000064481/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Router-Extenders-and-WiFi-Systems-PSV-2020-0256

Trust: 0.8

title:Netgear RBR750 and NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176225

Trust: 0.6

sources: JVNDB: JVNDB-2021-017172 // CNNVD: CNNVD-202112-2463

EXTERNAL IDS

db:NVDid:CVE-2021-45667

Trust: 3.3

db:JVNDBid:JVNDB-2021-017172

Trust: 0.8

db:CNNVDid:CNNVD-202112-2463

Trust: 0.6

db:VULMONid:CVE-2021-45667

Trust: 0.1

sources: VULMON: CVE-2021-45667 // JVNDB: JVNDB-2021-017172 // CNNVD: CNNVD-202112-2463 // NVD: CVE-2021-45667

REFERENCES

url:https://kb.netgear.com/000064481/security-advisory-for-stored-cross-site-scripting-on-some-router-extenders-and-wifi-systems-psv-2020-0256

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45667

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45667 // JVNDB: JVNDB-2021-017172 // CNNVD: CNNVD-202112-2463 // NVD: CVE-2021-45667

SOURCES

db:VULMONid:CVE-2021-45667
db:JVNDBid:JVNDB-2021-017172
db:CNNVDid:CNNVD-202112-2463
db:NVDid:CVE-2021-45667

LAST UPDATE DATE

2024-11-23T21:58:37.278000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45667date:2022-01-06T00:00:00
db:JVNDBid:JVNDB-2021-017172date:2023-01-06T05:40:00
db:CNNVDid:CNNVD-202112-2463date:2022-01-07T00:00:00
db:NVDid:CVE-2021-45667date:2024-11-21T06:32:49.870

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45667date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017172date:2023-01-06T00:00:00
db:CNNVDid:CNNVD-202112-2463date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45667date:2021-12-26T01:15:20.870