ID

VAR-202112-2354


CVE

CVE-2021-45595


TITLE

plural  NETGEAR  Command injection vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017108

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects LBR20 before 2.6.3.50, RBS50Y before 2.7.3.22, RBR10 before 2.7.3.22, RBR20 before 2.7.3.22, RBR40 before 2.7.3.22, RBR50 before 2.7.3.22, RBS10 before 2.7.3.22, RBS20 before 2.7.3.22, RBS40 before 2.7.3.22, RBS50 before 2.7.3.22, RBK12 before 2.7.3.22, RBK20 before 2.7.3.22, RBK40 before 2.7.3.22, and RBK50 before 2.7.3.22. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects LBR20 prior to 2.6.3.50, RBS50Y prior to 2.7.3.22, RBR10 prior to 2.7.3.22, RBR20 prior to 2.7.3.22, RBR40 prior to 2.7.3.22, RBR50 prior to 2.7.3.22, RBS10 prior to 2.7.3.22, RBS20 prior to 2.7.3.22, RBS40 prior to 2.7.3.22, RBS50 prior to 2.7.3.22, RBK12 prior to 2.7.3.22, RBK20 prior to 2.7.3.22, RBK40 prior to 2.7.3.22, and RBK50 prior to 2.7.3.22

Trust: 1.71

sources: NVD: CVE-2021-45595 // JVNDB: JVNDB-2021-017108 // VULMON: CVE-2021-45595

AFFECTED PRODUCTS

vendor:netgearmodel:rbs50scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbr10scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbk50scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbk12scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbr20scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbs10scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbk40scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:lbr20scope:ltversion:2.6.3.50

Trust: 1.0

vendor:netgearmodel:rbr50scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbs50yscope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbr40scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbk20scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbs20scope:ltversion:2.7.3.22

Trust: 1.0

vendor:netgearmodel:rbs40scope:ltversion:2.7.3.22

Trust: 1.0

vendor:ネットギアmodel:rbs50yscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs50scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr40scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr10scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs10scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs40scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr50scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:lbr20scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017108 // NVD: CVE-2021-45595

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45595
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-45595
value: HIGH

Trust: 1.0

NVD: CVE-2021-45595
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202112-2391
value: HIGH

Trust: 0.6

VULMON: CVE-2021-45595
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45595
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45595
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45595
baseSeverity: HIGH
baseScore: 7.6
vectorString: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-45595
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45595 // JVNDB: JVNDB-2021-017108 // CNNVD: CNNVD-202112-2391 // NVD: CVE-2021-45595 // NVD: CVE-2021-45595

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017108 // NVD: CVE-2021-45595

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2391

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202112-2391

PATCH

title:Security Advisory for Post-Authentication Command Injection on Some WiFi Systems, PSV-2020-0462url:https://kb.netgear.com/000064495/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0462

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177110

Trust: 0.6

sources: JVNDB: JVNDB-2021-017108 // CNNVD: CNNVD-202112-2391

EXTERNAL IDS

db:NVDid:CVE-2021-45595

Trust: 3.3

db:JVNDBid:JVNDB-2021-017108

Trust: 0.8

db:CNNVDid:CNNVD-202112-2391

Trust: 0.6

db:VULMONid:CVE-2021-45595

Trust: 0.1

sources: VULMON: CVE-2021-45595 // JVNDB: JVNDB-2021-017108 // CNNVD: CNNVD-202112-2391 // NVD: CVE-2021-45595

REFERENCES

url:https://kb.netgear.com/000064495/security-advisory-for-post-authentication-command-injection-on-some-wifi-systems-psv-2020-0462

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45595

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45595 // JVNDB: JVNDB-2021-017108 // CNNVD: CNNVD-202112-2391 // NVD: CVE-2021-45595

SOURCES

db:VULMONid:CVE-2021-45595
db:JVNDBid:JVNDB-2021-017108
db:CNNVDid:CNNVD-202112-2391
db:NVDid:CVE-2021-45595

LAST UPDATE DATE

2024-11-23T22:10:56.779000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45595date:2022-01-05T00:00:00
db:JVNDBid:JVNDB-2021-017108date:2023-01-04T06:52:00
db:CNNVDid:CNNVD-202112-2391date:2022-01-06T00:00:00
db:NVDid:CVE-2021-45595date:2024-11-21T06:32:37.180

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45595date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017108date:2023-01-04T00:00:00
db:CNNVDid:CNNVD-202112-2391date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45595date:2021-12-26T01:15:17.487