ID

VAR-202112-2334


CVE

CVE-2021-45615


TITLE

plural  NETGEAR  Command injection vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017087

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000P before 1.4.2.84, R8300 before 1.0.2.154, R8500 before 1.0.2.154, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects CBR40 prior to 2.5.0.24, CBR750 prior to 4.6.3.6, R7900P prior to 1.4.2.84, R7960P prior to 1.4.2.84, R8000P prior to 1.4.2.84, R8300 prior to 1.0.2.154, R8500 prior to 1.0.2.154, RBK752 prior to 3.2.17.12, RBR750 prior to 3.2.17.12, RBS750 prior to 3.2.17.12, RBK852 prior to 3.2.17.12, RBR850 prior to 3.2.17.12, and RBS850 prior to 3.2.17.12

Trust: 1.71

sources: NVD: CVE-2021-45615 // JVNDB: JVNDB-2021-017087 // VULMON: CVE-2021-45615

AFFECTED PRODUCTS

vendor:netgearmodel:rbr750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:cbr750scope:ltversion:4.6.3.6

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:r8500scope:ltversion:1.0.2.154

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:r8300scope:ltversion:1.0.2.154

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:cbr40scope:ltversion:2.5.0.24

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:ネットギアmodel:rbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7960pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk752scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk852scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8300scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbr40scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8000pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7900pscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017087 // NVD: CVE-2021-45615

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45615
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-45615
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-45615
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202112-2410
value: HIGH

Trust: 0.6

VULMON: CVE-2021-45615
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45615
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45615
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45615
baseSeverity: CRITICAL
baseScore: 9.6
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-45615
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45615 // JVNDB: JVNDB-2021-017087 // CNNVD: CNNVD-202112-2410 // NVD: CVE-2021-45615 // NVD: CVE-2021-45615

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017087 // NVD: CVE-2021-45615

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202112-2410

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202112-2410

PATCH

title:Security Advisory for Pre-Authentication Command Injection on Some Routers and WiFi Systems, PSV-2020-0521url:https://kb.netgear.com/000064514/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0521

Trust: 0.8

title:Netgear RBR750 and NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176389

Trust: 0.6

sources: JVNDB: JVNDB-2021-017087 // CNNVD: CNNVD-202112-2410

EXTERNAL IDS

db:NVDid:CVE-2021-45615

Trust: 3.3

db:JVNDBid:JVNDB-2021-017087

Trust: 0.8

db:CNNVDid:CNNVD-202112-2410

Trust: 0.6

db:VULMONid:CVE-2021-45615

Trust: 0.1

sources: VULMON: CVE-2021-45615 // JVNDB: JVNDB-2021-017087 // CNNVD: CNNVD-202112-2410 // NVD: CVE-2021-45615

REFERENCES

url:https://kb.netgear.com/000064514/security-advisory-for-pre-authentication-command-injection-on-some-routers-and-wifi-systems-psv-2020-0521

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45615

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45615 // JVNDB: JVNDB-2021-017087 // CNNVD: CNNVD-202112-2410 // NVD: CVE-2021-45615

SOURCES

db:VULMONid:CVE-2021-45615
db:JVNDBid:JVNDB-2021-017087
db:CNNVDid:CNNVD-202112-2410
db:NVDid:CVE-2021-45615

LAST UPDATE DATE

2024-11-23T21:50:45.841000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45615date:2022-01-05T00:00:00
db:JVNDBid:JVNDB-2021-017087date:2023-01-04T01:52:00
db:CNNVDid:CNNVD-202112-2410date:2022-01-10T00:00:00
db:NVDid:CVE-2021-45615date:2024-11-21T06:32:40.773

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45615date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017087date:2023-01-04T00:00:00
db:CNNVDid:CNNVD-202112-2410date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45615date:2021-12-26T01:15:18.473