ID

VAR-202112-2299


CVE

CVE-2021-45650


TITLE

plural  NETGEAR  Device information disclosure vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-017173

DESCRIPTION

Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RS400 before 1.5.1.80, R6400v2 before 1.0.4.102, R7000P before 1.3.2.126, R6700v3 before 1.0.4.102, and R6900P before 1.3.2.126. This affects R7000 prior to 1.0.11.110, R7900 prior to 1.0.4.30, R8000 prior to 1.0.4.62, RS400 prior to 1.5.1.80, R6400v2 prior to 1.0.4.102, R7000P prior to 1.3.2.126, R6700v3 prior to 1.0.4.102, and R6900P prior to 1.3.2.126

Trust: 1.71

sources: NVD: CVE-2021-45650 // JVNDB: JVNDB-2021-017173 // VULMON: CVE-2021-45650

AFFECTED PRODUCTS

vendor:netgearmodel:r7000pscope:ltversion:1.3.2.126

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.2.126

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.110

Trust: 1.0

vendor:netgearmodel:r7900scope:ltversion:1.0.4.30

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.4.102

Trust: 1.0

vendor:netgearmodel:r6700v3scope:ltversion:1.0.4.102

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.1.80

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.62

Trust: 1.0

vendor:ネットギアmodel:r7000pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7900scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6900pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6700v3scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rs400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6400v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017173 // NVD: CVE-2021-45650

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45650
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-45650
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-45650
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202112-2446
value: HIGH

Trust: 0.6

VULMON: CVE-2021-45650
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45650
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45650
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45650
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2021-45650
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45650 // JVNDB: JVNDB-2021-017173 // CNNVD: CNNVD-202112-2446 // NVD: CVE-2021-45650 // NVD: CVE-2021-45650

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.0

problemtype:information leak (CWE-200) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017173 // NVD: CVE-2021-45650

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2446

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202112-2446

PATCH

title:Security Advisory for Sensitive Information Disclosure on Some Routers, PSV-2020-0117url:https://kb.netgear.com/000064459/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-PSV-2020-0117

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176208

Trust: 0.6

sources: JVNDB: JVNDB-2021-017173 // CNNVD: CNNVD-202112-2446

EXTERNAL IDS

db:NVDid:CVE-2021-45650

Trust: 3.3

db:JVNDBid:JVNDB-2021-017173

Trust: 0.8

db:CNNVDid:CNNVD-202112-2446

Trust: 0.6

db:VULMONid:CVE-2021-45650

Trust: 0.1

sources: VULMON: CVE-2021-45650 // JVNDB: JVNDB-2021-017173 // CNNVD: CNNVD-202112-2446 // NVD: CVE-2021-45650

REFERENCES

url:https://kb.netgear.com/000064459/security-advisory-for-sensitive-information-disclosure-on-some-routers-psv-2020-0117

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45650

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45650 // JVNDB: JVNDB-2021-017173 // CNNVD: CNNVD-202112-2446 // NVD: CVE-2021-45650

SOURCES

db:VULMONid:CVE-2021-45650
db:JVNDBid:JVNDB-2021-017173
db:CNNVDid:CNNVD-202112-2446
db:NVDid:CVE-2021-45650

LAST UPDATE DATE

2024-11-23T23:11:03.097000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45650date:2022-01-06T00:00:00
db:JVNDBid:JVNDB-2021-017173date:2023-01-06T05:43:00
db:CNNVDid:CNNVD-202112-2446date:2022-01-07T00:00:00
db:NVDid:CVE-2021-45650date:2024-11-21T06:32:47.083

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45650date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017173date:2023-01-06T00:00:00
db:CNNVDid:CNNVD-202112-2446date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45650date:2021-12-26T01:15:20.103