ID

VAR-202112-2321


CVE

CVE-2021-45628


TITLE

plural  NETGEAR  Command injection vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017047

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 3.2.18.2, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBS40V before 2.6.2.4, and RBW30 before 2.6.2.2. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects CBR40 prior to 2.5.0.24, CBR750 prior to 3.2.18.2, RBK752 prior to 3.2.17.12, RBR750 prior to 3.2.17.12, RBS750 prior to 3.2.17.12, RBK852 prior to 3.2.17.12, RBR850 prior to 3.2.17.12, RBS850 prior to 3.2.17.12, RBS40V prior to 2.6.2.4, and RBW30 prior to 2.6.2.2

Trust: 1.71

sources: NVD: CVE-2021-45628 // JVNDB: JVNDB-2021-017047 // VULMON: CVE-2021-45628

AFFECTED PRODUCTS

vendor:netgearmodel:rbr750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbw30scope:ltversion:2.6.2.2

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbs40vscope:ltversion:2.6.2.4

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbs40vscope:eqversion:2.6.2.4

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:cbr40scope:ltversion:2.5.0.24

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:cbr750scope:ltversion:3.2.18.2

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:ネットギアmodel:cbr40scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk852scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs40vscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbw30scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk752scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs750scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017047 // NVD: CVE-2021-45628

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45628
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-45628
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-45628
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202112-2424
value: HIGH

Trust: 0.6

VULMON: CVE-2021-45628
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45628
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45628
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45628
baseSeverity: CRITICAL
baseScore: 9.6
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-45628
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45628 // JVNDB: JVNDB-2021-017047 // CNNVD: CNNVD-202112-2424 // NVD: CVE-2021-45628 // NVD: CVE-2021-45628

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017047 // NVD: CVE-2021-45628

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202112-2424

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202112-2424

PATCH

title:Security Advisory for Pre-Authentication Command Injection on Some WiFi Systems, PSV-2020-0472url:https://kb.netgear.com/000064125/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0472

Trust: 0.8

title:Netgear RBR750 and NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176403

Trust: 0.6

sources: JVNDB: JVNDB-2021-017047 // CNNVD: CNNVD-202112-2424

EXTERNAL IDS

db:NVDid:CVE-2021-45628

Trust: 3.3

db:JVNDBid:JVNDB-2021-017047

Trust: 0.8

db:CNNVDid:CNNVD-202112-2424

Trust: 0.6

db:VULMONid:CVE-2021-45628

Trust: 0.1

sources: VULMON: CVE-2021-45628 // JVNDB: JVNDB-2021-017047 // CNNVD: CNNVD-202112-2424 // NVD: CVE-2021-45628

REFERENCES

url:https://kb.netgear.com/000064125/security-advisory-for-pre-authentication-command-injection-on-some-wifi-systems-psv-2020-0472

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45628

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45628 // JVNDB: JVNDB-2021-017047 // CNNVD: CNNVD-202112-2424 // NVD: CVE-2021-45628

SOURCES

db:VULMONid:CVE-2021-45628
db:JVNDBid:JVNDB-2021-017047
db:CNNVDid:CNNVD-202112-2424
db:NVDid:CVE-2021-45628

LAST UPDATE DATE

2024-11-23T22:36:59.286000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45628date:2022-01-05T00:00:00
db:JVNDBid:JVNDB-2021-017047date:2022-12-28T03:06:00
db:CNNVDid:CNNVD-202112-2424date:2022-01-06T00:00:00
db:NVDid:CVE-2021-45628date:2024-11-21T06:32:43.157

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45628date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017047date:2022-12-28T00:00:00
db:CNNVDid:CNNVD-202112-2424date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45628date:2021-12-26T01:15:19.097