ID

VAR-202112-2309


CVE

CVE-2021-45640


TITLE

plural  NETGEAR  Vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2021-017516

DESCRIPTION

Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D3600 before 1.0.0.72, D6000 before 1.0.0.72, D6200 before 1.1.00.34, D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7000 before 1.0.1.74, D7000v2 before 1.0.0.53, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DC112A before 1.0.0.42, DGN2200v4 before 1.0.0.110, DGND2200Bv4 before 1.0.0.109, DM200 before 1.0.0.61, EX3700 before 1.0.0.76, EX3800 before 1.0.0.76, EX6120 before 1.0.0.46, EX6130 before 1.0.0.28, EX7000 before 1.0.1.78, PR2000 before 1.0.0.28, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6250 before 1.0.4.34, R6300v2 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v3 before 1.0.2.66, R6900 before 1.0.2.6, R7000 before 1.0.9.34, R7100LG before 1.0.0.50, R7500v2 before 1.0.3.40, R7900P before 1.4.1.50, R8000P before 1.4.1.50, R8900 before 1.0.4.12, R9000 before 1.0.4.12, RBK20 before 2.3.0.28, RBK40 before 2.3.0.28, RBK50 before 2.3.0.32, RBR20 before 2.3.0.28, RBR40 before 2.3.0.28, RBR50 before 2.3.0.32, RBS20 before 2.3.0.28, RBS40 before 2.3.0.28, RBS50 before 2.3.0.32, WN3000RPv2 before 1.0.0.78, WNDR3400v3 before 1.0.1.24, WNR2000v5 before 1.0.0.70, WNR2020 before 1.1.0.62, WNR3500Lv2 before 1.2.0.62, XR450 before 2.3.2.56, and XR500 before 2.3.2.56. plural NETGEAR There is an unspecified vulnerability in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects D3600 prior to 1.0.0.72, D6000 prior to 1.0.0.72, D6200 prior to 1.1.00.34, D6220 prior to 1.0.0.52, D6400 prior to 1.0.0.86, D7000 prior to 1.0.1.74, D7000v2 prior to 1.0.0.53, D7800 prior to 1.0.1.56, D8500 prior to 1.0.3.44, DC112A prior to 1.0.0.42, DGN2200v4 prior to 1.0.0.110, DGND2200Bv4 prior to 1.0.0.109, DM200 prior to 1.0.0.61, EX3700 prior to 1.0.0.76, EX3800 prior to 1.0.0.76, EX6120 prior to 1.0.0.46, EX6130 prior to 1.0.0.28, EX7000 prior to 1.0.1.78, PR2000 prior to 1.0.0.28, R6220 prior to 1.1.0.100, R6230 prior to 1.1.0.100, R6250 prior to 1.0.4.34, R6300v2 prior to 1.0.4.34, R6400 prior to 1.0.1.46, R6400v2 prior to 1.0.2.66, R6700 prior to 1.0.2.6, R6700v3 prior to 1.0.2.66, R6900 prior to 1.0.2.6, R7000 prior to 1.0.9.34, R7100LG prior to 1.0.0.50, R7500v2 prior to 1.0.3.40, R7900P prior to 1.4.1.50, R8000P prior to 1.4.1.50, R8900 prior to 1.0.4.12, R9000 prior to 1.0.4.12, RBK20 prior to 2.3.0.28, RBK40 prior to 2.3.0.28, RBK50 prior to 2.3.0.32, RBR20 prior to 2.3.0.28, RBR40 prior to 2.3.0.28, RBR50 prior to 2.3.0.32, RBS20 prior to 2.3.0.28, RBS40 prior to 2.3.0.28, RBS50 prior to 2.3.0.32, WN3000RPv2 prior to 1.0.0.78, WNDR3400v3 prior to 1.0.1.24, WNR2000v5 prior to 1.0.0.70, WNR2020 prior to 1.1.0.62, WNR3500Lv2 prior to 1.2.0.62, XR450 prior to 2.3.2.56, and XR500 prior to 2.3.2.56

Trust: 1.71

sources: NVD: CVE-2021-45640 // JVNDB: JVNDB-2021-017516 // VULMON: CVE-2021-45640

AFFECTED PRODUCTS

vendor:netgearmodel:ex3800scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:dc112ascope:ltversion:1.0.0.42

Trust: 1.0

vendor:netgearmodel:r9000scope:ltversion:1.0.4.12

Trust: 1.0

vendor:netgearmodel:rbr20scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:d6000scope:ltversion:1.0.0.72

Trust: 1.0

vendor:netgearmodel:pr2000scope:ltversion:1.0.0.28

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.2.66

Trust: 1.0

vendor:netgearmodel:wn3000rpv2scope:ltversion:1.0.0.78

Trust: 1.0

vendor:netgearmodel:d6200scope:ltversion:1.1.00.34

Trust: 1.0

vendor:netgearmodel:wnr2020scope:ltversion:1.1.0.62

Trust: 1.0

vendor:netgearmodel:ex7000scope:ltversion:1.0.1.78

Trust: 1.0

vendor:netgearmodel:dm200scope:ltversion:1.0.0.61

Trust: 1.0

vendor:netgearmodel:d3600scope:ltversion:1.0.0.72

Trust: 1.0

vendor:netgearmodel:dgn2200bv4scope:ltversion:1.0.0.109

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.1.50

Trust: 1.0

vendor:netgearmodel:rbk40scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:rbr40scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:rbk20scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.1.50

Trust: 1.0

vendor:netgearmodel:rbs20scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:dgn2200v4scope:ltversion:1.0.0.110

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.9.34

Trust: 1.0

vendor:netgearmodel:ex3700scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.52

Trust: 1.0

vendor:netgearmodel:d7000scope:ltversion:1.0.1.74

Trust: 1.0

vendor:netgearmodel:xr500scope:ltversion:2.3.2.56

Trust: 1.0

vendor:netgearmodel:r6900scope:ltversion:1.0.2.6

Trust: 1.0

vendor:netgearmodel:r6300v2scope:ltversion:1.0.4.34

Trust: 1.0

vendor:netgearmodel:r6220scope:ltversion:1.1.0.100

Trust: 1.0

vendor:netgearmodel:r7500v2scope:ltversion:1.0.3.40

Trust: 1.0

vendor:netgearmodel:ex6130scope:ltversion:1.0.0.28

Trust: 1.0

vendor:netgearmodel:r6250scope:ltversion:1.0.4.34

Trust: 1.0

vendor:netgearmodel:r8900scope:ltversion:1.0.4.12

Trust: 1.0

vendor:netgearmodel:rbs40scope:ltversion:2.3.0.28

Trust: 1.0

vendor:netgearmodel:wndr3400v3scope:ltversion:1.0.1.24

Trust: 1.0

vendor:netgearmodel:xr450scope:ltversion:2.3.2.56

Trust: 1.0

vendor:netgearmodel:wnr2000v5scope:ltversion:1.0.0.70

Trust: 1.0

vendor:netgearmodel:rbs50scope:ltversion:2.3.0.32

Trust: 1.0

vendor:netgearmodel:d7800scope:ltversion:1.0.1.56

Trust: 1.0

vendor:netgearmodel:rbk50scope:ltversion:2.3.0.32

Trust: 1.0

vendor:netgearmodel:r6700v3scope:ltversion:1.0.2.66

Trust: 1.0

vendor:netgearmodel:ex6120scope:ltversion:1.0.0.46

Trust: 1.0

vendor:netgearmodel:r6700scope:ltversion:1.0.2.6

Trust: 1.0

vendor:netgearmodel:d8500scope:ltversion:1.0.3.44

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.50

Trust: 1.0

vendor:netgearmodel:d7000v2scope:ltversion:1.0.0.53

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.46

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.86

Trust: 1.0

vendor:netgearmodel:r6230scope:ltversion:1.1.0.100

Trust: 1.0

vendor:netgearmodel:wnr3500lv2scope:ltversion:1.2.0.62

Trust: 1.0

vendor:netgearmodel:rbr50scope:ltversion:2.3.0.32

Trust: 1.0

vendor:ネットギアmodel:d8500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6200scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d3600scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:dc112ascope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7000v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6220scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017516 // NVD: CVE-2021-45640

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45640
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-45640
value: LOW

Trust: 1.0

NVD: CVE-2021-45640
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202112-2436
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2021-45640
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-45640
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45640
baseSeverity: LOW
baseScore: 3.9
vectorString: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 0.5
impactScore: 3.4
version: 3.1

Trust: 1.0

NVD: CVE-2021-45640
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-017516 // CNNVD: CNNVD-202112-2436 // NVD: CVE-2021-45640 // NVD: CVE-2021-45640

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017516 // NVD: CVE-2021-45640

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2436

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202112-2436

PATCH

title:Security Advisory for Security Misconfiguration on Some Routers, Extenders, and WiFi Systems, PSV-2018-0228url:https://kb.netgear.com/000064045/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2018-0228

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176674

Trust: 0.6

sources: JVNDB: JVNDB-2021-017516 // CNNVD: CNNVD-202112-2436

EXTERNAL IDS

db:NVDid:CVE-2021-45640

Trust: 3.3

db:JVNDBid:JVNDB-2021-017516

Trust: 0.8

db:CNNVDid:CNNVD-202112-2436

Trust: 0.6

db:VULMONid:CVE-2021-45640

Trust: 0.1

sources: VULMON: CVE-2021-45640 // JVNDB: JVNDB-2021-017516 // CNNVD: CNNVD-202112-2436 // NVD: CVE-2021-45640

REFERENCES

url:https://kb.netgear.com/000064045/security-advisory-for-security-misconfiguration-on-some-routers-extenders-and-wifi-systems-psv-2018-0228

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45640

Trust: 1.4

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45640 // JVNDB: JVNDB-2021-017516 // CNNVD: CNNVD-202112-2436 // NVD: CVE-2021-45640

SOURCES

db:VULMONid:CVE-2021-45640
db:JVNDBid:JVNDB-2021-017516
db:CNNVDid:CNNVD-202112-2436
db:NVDid:CVE-2021-45640

LAST UPDATE DATE

2024-11-23T23:00:59.703000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45640date:2021-12-27T00:00:00
db:JVNDBid:JVNDB-2021-017516date:2023-01-24T05:26:00
db:CNNVDid:CNNVD-202112-2436date:2022-01-13T00:00:00
db:NVDid:CVE-2021-45640date:2024-11-21T06:32:45.090

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45640date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017516date:2023-01-24T00:00:00
db:CNNVDid:CNNVD-202112-2436date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45640date:2021-12-26T01:15:19.643