ID

VAR-202112-2330


CVE

CVE-2021-45619


TITLE

plural  NETGEAR  Command injection vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017545

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects EX6200v2 before 1.0.1.86, EX6250 before 1.0.0.134, EX7700 before 1.0.0.216, EX8000 before 1.0.1.232, LBR1020 before 2.6.3.58, LBR20 before 2.6.3.50, R7800 before 1.0.2.80, R8900 before 1.0.5.26, R9000 before 1.0.5.26, RBS50Y before 2.7.3.22, WNR2000v5 before 1.0.0.76, XR700 before 1.0.1.36, EX6150v2 before 1.0.1.98, EX7300 before 1.0.2.158, EX7320 before 1.0.0.134, RAX10 before 1.0.2.88, RAX120 before 1.2.0.16, RAX70 before 1.0.2.88, EX6100v2 before 1.0.1.98, EX6400 before 1.0.2.158, EX7300v2 before 1.0.0.134, R6700AX before 1.0.2.88, RAX120v2 before 1.2.0.16, RAX78 before 1.0.2.88, EX6410 before 1.0.0.134, RBR10 before 2.7.3.22, RBR20 before 2.7.3.22, RBR350 before 4.3.4.7, RBR40 before 2.7.3.22, RBR50 before 2.7.3.22, EX6420 before 1.0.0.134, RBS10 before 2.7.3.22, RBS20 before 2.7.3.22, RBS350 before 4.3.4.7, RBS40 before 2.7.3.22, RBS50 before 2.7.3.22, EX6400v2 before 1.0.0.134, RBK12 before 2.7.3.22, RBK20 before 2.7.3.22, RBK352 before 4.3.4.7, RBK40 before 2.7.3.22, and RBK50 before 2.7.3.22. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects EX6200v2 prior to 1.0.1.86, EX6250 prior to 1.0.0.134, EX7700 prior to 1.0.0.216, EX8000 prior to 1.0.1.232, LBR1020 prior to 2.6.3.58, LBR20 prior to 2.6.3.50, R7800 prior to 1.0.2.80, R8900 prior to 1.0.5.26, R9000 prior to 1.0.5.26, RBS50Y prior to 2.7.3.22, WNR2000v5 prior to 1.0.0.76, XR700 prior to 1.0.1.36, EX6150v2 prior to 1.0.1.98, EX7300 prior to 1.0.2.158, EX7320 prior to 1.0.0.134, RAX10 prior to 1.0.2.88, RAX120 prior to 1.2.0.16, RAX70 prior to 1.0.2.88, EX6100v2 prior to 1.0.1.98, EX6400 prior to 1.0.2.158, EX7300v2 prior to 1.0.0.134, R6700AX prior to 1.0.2.88, RAX120v2 prior to 1.2.0.16, RAX78 prior to 1.0.2.88, EX6410 prior to 1.0.0.134, RBR10 prior to 2.7.3.22, RBR20 prior to 2.7.3.22, RBR350 prior to 4.3.4.7, RBR40 prior to 2.7.3.22, RBR50 prior to 2.7.3.22, EX6420 prior to 1.0.0.134, RBS10 prior to 2.7.3.22, RBS20 prior to 2.7.3.22, RBS350 prior to 4.3.4.7, RBS40 prior to 2.7.3.22, RBS50 prior to 2.7.3.22, EX6400v2 prior to 1.0.0.134, RBK12 prior to 2.7.3.22, RBK20 prior to 2.7.3.22, RBK352 prior to 4.3.4.7, RBK40 prior to 2.7.3.22, and RBK50 prior to 2.7.3.22

Trust: 1.71

sources: NVD: CVE-2021-45619 // JVNDB: JVNDB-2021-017545 // VULMON: CVE-2021-45619

AFFECTED PRODUCTS

vendor:netgearmodel:rax120v2scope:ltversion:1.2.0.16

Trust: 1.0

vendor:netgearmodel:rbr10scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:r9000scope:ltversion:1.0.5.26

Trust: 1.0

vendor:netgearmodel:rax78scope:ltversion:1.0.2.88

Trust: 1.0

vendor:netgearmodel:ex6420scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:ex7320scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:lbr20scope:ltversion:2.6.3.50

Trust: 1.0

vendor:netgearmodel:lbr1020scope:ltversion:2.6.3.58

Trust: 1.0

vendor:netgearmodel:xr700scope:ltversion:1.0.1.36

Trust: 1.0

vendor:netgearmodel:ex6400scope:ltversion:1.0.2.158

Trust: 1.0

vendor:netgearmodel:ex8000scope:ltversion:1.0.1.232

Trust: 1.0

vendor:netgearmodel:wnr2000v5scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:rax10scope:ltversion:1.0.2.88

Trust: 1.0

vendor:netgearmodel:ex6250scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:ex7700scope:ltversion:1.0.0.216

Trust: 1.0

vendor:netgearmodel:rbs50scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbk50scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbs350scope:ltversion:4.3.4.7

Trust: 1.0

vendor:netgearmodel:ex7300scope:ltversion:1.0.2.158

Trust: 1.0

vendor:netgearmodel:ex6410scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:r8900scope:ltversion:1.0.5.26

Trust: 1.0

vendor:netgearmodel:r7800scope:ltversion:1.0.2.80

Trust: 1.0

vendor:netgearmodel:ex6100v2scope:ltversion:1.0.1.98

Trust: 1.0

vendor:netgearmodel:r6700axscope:ltversion:1.0.2.88

Trust: 1.0

vendor:netgearmodel:rbr20scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbk12scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:ex6200v2scope:ltversion:1.0.1.86

Trust: 1.0

vendor:netgearmodel:rbr50scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbs50yscope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbr40scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rax120scope:ltversion:1.2.0.16

Trust: 1.0

vendor:netgearmodel:rbk20scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbs20scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbk40scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbs10scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rax70scope:ltversion:1.0.2.88

Trust: 1.0

vendor:netgearmodel:ex7300v2scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:rbr350scope:ltversion:4.3.4.7

Trust: 1.0

vendor:netgearmodel:rbk352scope:ltversion:4.3.4.7

Trust: 1.0

vendor:netgearmodel:ex6400v2scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:ex6150v2scope:ltversion:1.0.1.98

Trust: 1.0

vendor:netgearmodel:rbs40scope:ltversion:2.7.3.22

Trust: 1.0

vendor:ネットギアmodel:r8900scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:xr700scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs50yscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:lbr20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex7700scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:wnr2000v5scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6250scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:lbr1020scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex8000scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017545 // NVD: CVE-2021-45619

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45619
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2021-45619
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-45619
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202112-2413
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2021-45619
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-45619
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45619
baseSeverity: CRITICAL
baseScore: 9.6
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-45619
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-017545 // CNNVD: CNNVD-202112-2413 // NVD: CVE-2021-45619 // NVD: CVE-2021-45619

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017545 // NVD: CVE-2021-45619

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2413

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202112-2413

PATCH

title:Security Advisory for Pre-Authentication Command Injection on Some Routers, Extenders, and WiFi Systems, PSV-2020-0435url:https://kb.netgear.com/000064492/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0435

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176392

Trust: 0.6

sources: JVNDB: JVNDB-2021-017545 // CNNVD: CNNVD-202112-2413

EXTERNAL IDS

db:NVDid:CVE-2021-45619

Trust: 3.3

db:JVNDBid:JVNDB-2021-017545

Trust: 0.8

db:CNNVDid:CNNVD-202112-2413

Trust: 0.6

db:VULMONid:CVE-2021-45619

Trust: 0.1

sources: VULMON: CVE-2021-45619 // JVNDB: JVNDB-2021-017545 // CNNVD: CNNVD-202112-2413 // NVD: CVE-2021-45619

REFERENCES

url:https://kb.netgear.com/000064492/security-advisory-for-pre-authentication-command-injection-on-some-routers-extenders-and-wifi-systems-psv-2020-0435

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45619

Trust: 1.4

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45619 // JVNDB: JVNDB-2021-017545 // CNNVD: CNNVD-202112-2413 // NVD: CVE-2021-45619

SOURCES

db:VULMONid:CVE-2021-45619
db:JVNDBid:JVNDB-2021-017545
db:CNNVDid:CNNVD-202112-2413
db:NVDid:CVE-2021-45619

LAST UPDATE DATE

2024-11-23T23:00:59.678000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45619date:2021-12-27T00:00:00
db:JVNDBid:JVNDB-2021-017545date:2023-01-25T02:07:00
db:CNNVDid:CNNVD-202112-2413date:2022-01-11T00:00:00
db:NVDid:CVE-2021-45619date:2024-11-21T06:32:41.523

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45619date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017545date:2023-01-25T00:00:00
db:CNNVDid:CNNVD-202112-2413date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45619date:2021-12-26T01:15:18.657