ID

VAR-202112-2405


CVE

CVE-2021-45543


TITLE

plural  NETGEAR  Command injection vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017198

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R8000 before 1.0.4.74, RAX200 before 1.0.4.120, R8000P before 1.4.2.84, R7900P before 1.4.2.84, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and RBK852 before 3.2.17.12. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects R8000 prior to 1.0.4.74, RAX200 prior to 1.0.4.120, R8000P prior to 1.4.2.84, R7900P prior to 1.4.2.84, RBR850 prior to 3.2.17.12, RBS850 prior to 3.2.17.12, and RBK852 prior to 3.2.17.12

Trust: 1.71

sources: NVD: CVE-2021-45543 // JVNDB: JVNDB-2021-017198 // VULMON: CVE-2021-45543

AFFECTED PRODUCTS

vendor:netgearmodel:r7900pscope:eqversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.74

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.4.120

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:ネットギアmodel:rbk852scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7900pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8000pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax200scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017198 // NVD: CVE-2021-45543

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45543
value: MEDIUM

Trust: 1.0

cve@mitre.org: CVE-2021-45543
value: HIGH

Trust: 1.0

NVD: CVE-2021-45543
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202112-2357
value: MEDIUM

Trust: 0.6

VULMON: CVE-2021-45543
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45543
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45543
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45543
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.7
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-45543
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45543 // JVNDB: JVNDB-2021-017198 // CNNVD: CNNVD-202112-2357 // NVD: CVE-2021-45543 // NVD: CVE-2021-45543

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017198 // NVD: CVE-2021-45543

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202112-2357

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202112-2357

PATCH

title:Security Advisory for Post-Authentication Command Injection on Some Routers and WiFi Systems, PSV-2020-0541url:https://kb.netgear.com/000064517/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0541

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176370

Trust: 0.6

sources: JVNDB: JVNDB-2021-017198 // CNNVD: CNNVD-202112-2357

EXTERNAL IDS

db:NVDid:CVE-2021-45543

Trust: 3.3

db:JVNDBid:JVNDB-2021-017198

Trust: 0.8

db:CNNVDid:CNNVD-202112-2357

Trust: 0.6

db:VULMONid:CVE-2021-45543

Trust: 0.1

sources: VULMON: CVE-2021-45543 // JVNDB: JVNDB-2021-017198 // CNNVD: CNNVD-202112-2357 // NVD: CVE-2021-45543

REFERENCES

url:https://kb.netgear.com/000064517/security-advisory-for-post-authentication-command-injection-on-some-routers-and-wifi-systems-psv-2020-0541

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45543

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45543 // JVNDB: JVNDB-2021-017198 // CNNVD: CNNVD-202112-2357 // NVD: CVE-2021-45543

SOURCES

db:VULMONid:CVE-2021-45543
db:JVNDBid:JVNDB-2021-017198
db:CNNVDid:CNNVD-202112-2357
db:NVDid:CVE-2021-45543

LAST UPDATE DATE

2024-11-23T22:05:04.641000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45543date:2022-01-06T00:00:00
db:JVNDBid:JVNDB-2021-017198date:2023-01-10T00:56:00
db:CNNVDid:CNNVD-202112-2357date:2022-01-07T00:00:00
db:NVDid:CVE-2021-45543date:2024-11-21T06:32:28.333

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45543date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017198date:2023-01-10T00:00:00
db:CNNVDid:CNNVD-202112-2357date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45543date:2021-12-26T01:15:15.037