ID

VAR-202112-2391


CVE

CVE-2021-45557


TITLE

plural  NETGEAR  Command injection vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017573

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TUP before 1.0.5.3, GS710TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS724TPP before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS752TPv2 before 6.0.8.2, GS752TPP before 6.0.8.2, GS750E before 1.0.1.10, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects GC108P prior to 1.0.8.2, GC108PP prior to 1.0.8.2, GS108Tv3 prior to 7.0.7.2, GS110TPv3 prior to 7.0.7.2, GS110TPP prior to 7.0.7.2, GS110TUP prior to 1.0.5.3, GS710TUP prior to 1.0.5.3, GS308T prior to 1.0.3.2, GS310TP prior to 1.0.3.2, GS710TUP prior to 1.0.5.3, GS716TP prior to 1.0.4.2, GS716TPP prior to 1.0.4.2, GS724TPP prior to 2.0.6.3, GS724TPv2 prior to 2.0.6.3, GS724TPP prior to 2.0.6.3, GS728TPPv2 prior to 6.0.8.2, GS728TPv2 prior to 6.0.8.2, GS752TPv2 prior to 6.0.8.2, GS752TPP prior to 6.0.8.2, GS750E prior to 1.0.1.10, MS510TXM prior to 1.0.4.2, and MS510TXUP prior to 1.0.4.2

Trust: 1.71

sources: NVD: CVE-2021-45557 // JVNDB: JVNDB-2021-017573 // VULMON: CVE-2021-45557

AFFECTED PRODUCTS

vendor:netgearmodel:gs110tupscope:ltversion:1.0.5.3

Trust: 1.0

vendor:netgearmodel:ms510txmscope:ltversion:1.0.4.2

Trust: 1.0

vendor:netgearmodel:gs724tppscope:ltversion:2.0.6.3

Trust: 1.0

vendor:netgearmodel:gs108tv3scope:ltversion:7.0.7.2

Trust: 1.0

vendor:netgearmodel:gs110tppscope:ltversion:7.0.7.2

Trust: 1.0

vendor:netgearmodel:gs728tppv2scope:ltversion:6.0.8.2

Trust: 1.0

vendor:netgearmodel:gc108ppscope:ltversion:1.0.8.2

Trust: 1.0

vendor:netgearmodel:gs716tpscope:ltversion:1.0.4.2

Trust: 1.0

vendor:netgearmodel:gs728tpv2scope:ltversion:6.0.8.2

Trust: 1.0

vendor:netgearmodel:gs724tpv2scope:ltversion:2.0.6.3

Trust: 1.0

vendor:netgearmodel:gc108pscope:ltversion:1.0.8.2

Trust: 1.0

vendor:netgearmodel:gs716tppscope:ltversion:1.0.4.2

Trust: 1.0

vendor:netgearmodel:gs750escope:ltversion:1.0.1.10

Trust: 1.0

vendor:netgearmodel:gs110tpv3scope:ltversion:7.0.7.2

Trust: 1.0

vendor:netgearmodel:gs752tpv2scope:ltversion:6.0.8.2

Trust: 1.0

vendor:netgearmodel:gs752tppscope:ltversion:6.0.8.2

Trust: 1.0

vendor:netgearmodel:gs308tscope:ltversion:1.0.3.2

Trust: 1.0

vendor:netgearmodel:ms510txupscope:ltversion:1.0.4.2

Trust: 1.0

vendor:netgearmodel:gs710tupscope:ltversion:1.0.5.3

Trust: 1.0

vendor:netgearmodel:gs310tpscope:ltversion:1.0.3.2

Trust: 1.0

vendor:ネットギアmodel:gs310tpscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gc108pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs710tupscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs308tscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gc108ppscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs110tpv3scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs110tupscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs110tppscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs108tv3scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017573 // NVD: CVE-2021-45557

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45557
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-45557
value: HIGH

Trust: 1.0

NVD: CVE-2021-45557
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202112-2290
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2021-45557
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-45557
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45557
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-45557
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-017573 // CNNVD: CNNVD-202112-2290 // NVD: CVE-2021-45557 // NVD: CVE-2021-45557

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017573 // NVD: CVE-2021-45557

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2290

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202112-2290

PATCH

title:Security Advisory for Post-Authentication Command Injection on Some Switches, PSV-2021-0167url:https://kb.netgear.com/000064164/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Switches-PSV-2021-0167

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=175966

Trust: 0.6

sources: JVNDB: JVNDB-2021-017573 // CNNVD: CNNVD-202112-2290

EXTERNAL IDS

db:NVDid:CVE-2021-45557

Trust: 3.3

db:JVNDBid:JVNDB-2021-017573

Trust: 0.8

db:CNNVDid:CNNVD-202112-2290

Trust: 0.6

db:VULMONid:CVE-2021-45557

Trust: 0.1

sources: VULMON: CVE-2021-45557 // JVNDB: JVNDB-2021-017573 // CNNVD: CNNVD-202112-2290 // NVD: CVE-2021-45557

REFERENCES

url:https://kb.netgear.com/000064164/security-advisory-for-post-authentication-command-injection-on-some-switches-psv-2021-0167

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45557

Trust: 1.4

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45557 // JVNDB: JVNDB-2021-017573 // CNNVD: CNNVD-202112-2290 // NVD: CVE-2021-45557

SOURCES

db:VULMONid:CVE-2021-45557
db:JVNDBid:JVNDB-2021-017573
db:CNNVDid:CNNVD-202112-2290
db:NVDid:CVE-2021-45557

LAST UPDATE DATE

2024-11-23T22:57:50.272000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45557date:2021-12-27T00:00:00
db:JVNDBid:JVNDB-2021-017573date:2023-01-27T01:39:00
db:CNNVDid:CNNVD-202112-2290date:2022-01-11T00:00:00
db:NVDid:CVE-2021-45557date:2024-11-21T06:32:30.807

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45557date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017573date:2023-01-27T00:00:00
db:CNNVDid:CNNVD-202112-2290date:2021-12-25T00:00:00
db:NVDid:CVE-2021-45557date:2021-12-26T01:15:15.707