ID

VAR-202112-2339


CVE

CVE-2021-45610


TITLE

plural  NETGEAR  Classic buffer overflow vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017556

DESCRIPTION

Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D6220 before 1.0.0.66, D6400 before 1.0.0.100, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, DC112A before 1.0.0.52, DGN2200v4 before 1.0.0.118, EAX80 before 1.0.1.64, R6250 before 1.0.4.48, R7000 before 1.0.11.110, R7100LG before 1.0.0.72, R7900 before 1.0.4.30, R7960P before 1.4.1.64, R8000 before 1.0.4.62, RAX200 before 1.0.3.106, RS400 before 1.5.1.80, XR300 before 1.0.3.68, R6400v2 before 1.0.4.106, R7000P before 1.3.2.132, R8000P before 1.4.1.64, RAX20 before 1.0.2.82, RAX45 before 1.0.2.82, RAX80 before 1.0.3.106, R6700v3 before 1.0.4.106, R6900P before 1.3.2.132, R7900P before 1.4.1.64, RAX15 before 1.0.2.82, RAX50 before 1.0.2.82, and RAX75 before 1.0.3.106. plural NETGEAR A classic buffer overflow vulnerability exists on the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects D6220 prior to 1.0.0.66, D6400 prior to 1.0.0.100, D7000v2 prior to 1.0.0.66, D8500 prior to 1.0.3.58, DC112A prior to 1.0.0.52, DGN2200v4 prior to 1.0.0.118, EAX80 prior to 1.0.1.64, R6250 prior to 1.0.4.48, R7000 prior to 1.0.11.110, R7100LG prior to 1.0.0.72, R7900 prior to 1.0.4.30, R7960P prior to 1.4.1.64, R8000 prior to 1.0.4.62, RAX200 prior to 1.0.3.106, RS400 prior to 1.5.1.80, XR300 prior to 1.0.3.68, R6400v2 prior to 1.0.4.106, R7000P prior to 1.3.2.132, R8000P prior to 1.4.1.64, RAX20 prior to 1.0.2.82, RAX45 prior to 1.0.2.82, RAX80 prior to 1.0.3.106, R6700v3 prior to 1.0.4.106, R6900P prior to 1.3.2.132, R7900P prior to 1.4.1.64, RAX15 prior to 1.0.2.82, RAX50 prior to 1.0.2.82, and RAX75 prior to 1.0.3.106

Trust: 1.71

sources: NVD: CVE-2021-45610 // JVNDB: JVNDB-2021-017556 // VULMON: CVE-2021-45610

AFFECTED PRODUCTS

vendor:netgearmodel:dgn2200v4scope:ltversion:1.0.0.118

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.66

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.2.132

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.1.64

Trust: 1.0

vendor:netgearmodel:rax20scope:ltversion:1.0.2.82

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.62

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.72

Trust: 1.0

vendor:netgearmodel:xr300scope:ltversion:1.0.3.68

Trust: 1.0

vendor:netgearmodel:d7000v2scope:ltversion:1.0.0.66

Trust: 1.0

vendor:netgearmodel:rax50scope:ltversion:1.0.2.82

Trust: 1.0

vendor:netgearmodel:eax80scope:ltversion:1.0.1.64

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.2.132

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.100

Trust: 1.0

vendor:netgearmodel:rax15scope:ltversion:1.0.2.82

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.1.80

Trust: 1.0

vendor:netgearmodel:r6250scope:ltversion:1.0.4.48

Trust: 1.0

vendor:netgearmodel:dc112ascope:ltversion:1.0.0.52

Trust: 1.0

vendor:netgearmodel:rax45scope:ltversion:1.0.2.82

Trust: 1.0

vendor:netgearmodel:r7900scope:ltversion:1.0.4.30

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.1.64

Trust: 1.0

vendor:netgearmodel:d8500scope:ltversion:1.0.3.58

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.1.64

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.4.106

Trust: 1.0

vendor:netgearmodel:r6700v3scope:ltversion:1.0.4.106

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.110

Trust: 1.0

vendor:ネットギアmodel:dgn2200v4scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6220scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6250scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d8500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:eax80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7000v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:dc112ascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017556 // NVD: CVE-2021-45610

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45610
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2021-45610
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-45610
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202112-2405
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2021-45610
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-45610
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45610
baseSeverity: CRITICAL
baseScore: 9.6
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-45610
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-017556 // CNNVD: CNNVD-202112-2405 // NVD: CVE-2021-45610 // NVD: CVE-2021-45610

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017556 // NVD: CVE-2021-45610

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2405

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202112-2405

PATCH

title:Security Advisory for Pre-Authentication Buffer Overflow on Some Routers, PSV-2020-0322url:https://kb.netgear.com/000064487/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0322

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177126

Trust: 0.6

sources: JVNDB: JVNDB-2021-017556 // CNNVD: CNNVD-202112-2405

EXTERNAL IDS

db:NVDid:CVE-2021-45610

Trust: 3.3

db:JVNDBid:JVNDB-2021-017556

Trust: 0.8

db:CNNVDid:CNNVD-202112-2405

Trust: 0.6

db:VULMONid:CVE-2021-45610

Trust: 0.1

sources: VULMON: CVE-2021-45610 // JVNDB: JVNDB-2021-017556 // CNNVD: CNNVD-202112-2405 // NVD: CVE-2021-45610

REFERENCES

url:https://kb.netgear.com/000064487/security-advisory-for-pre-authentication-buffer-overflow-on-some-routers-psv-2020-0322

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45610

Trust: 1.4

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45610 // JVNDB: JVNDB-2021-017556 // CNNVD: CNNVD-202112-2405 // NVD: CVE-2021-45610

SOURCES

db:VULMONid:CVE-2021-45610
db:JVNDBid:JVNDB-2021-017556
db:CNNVDid:CNNVD-202112-2405
db:NVDid:CVE-2021-45610

LAST UPDATE DATE

2024-11-23T21:33:26.729000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45610date:2021-12-27T00:00:00
db:JVNDBid:JVNDB-2021-017556date:2023-01-25T05:22:00
db:CNNVDid:CNNVD-202112-2405date:2022-01-11T00:00:00
db:NVDid:CVE-2021-45610date:2024-11-21T06:32:39.750

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45610date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017556date:2023-01-25T00:00:00
db:CNNVDid:CNNVD-202112-2405date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45610date:2021-12-26T01:15:18.177