ID

VAR-202112-2408


CVE

CVE-2021-45540


TITLE

plural  NETGEAR  Command injection vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017199

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7000 before 1.0.11.126, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.3.106, MR60 before 1.0.6.110, RAX45 before 1.0.2.66, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX50 before 1.0.2.66, and RAX75 before 1.0.3.106. plural NETGEAR A command injection vulnerability exists in the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects R7000 prior to 1.0.11.126, R7900 prior to 1.0.4.46, R7900P prior to 1.4.2.84, R7960P prior to 1.4.2.84, R8000 prior to 1.0.4.74, R8000P prior to 1.4.2.84, RAX200 prior to 1.0.3.106, MR60 prior to 1.0.6.110, RAX45 prior to 1.0.2.66, RAX80 prior to 1.0.3.106, MS60 prior to 1.0.6.110, RAX50 prior to 1.0.2.66, and RAX75 prior to 1.0.3.106

Trust: 1.71

sources: NVD: CVE-2021-45540 // JVNDB: JVNDB-2021-017199 // VULMON: CVE-2021-45540

AFFECTED PRODUCTS

vendor:netgearmodel:r7900scope:ltversion:1.0.4.46

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:rax45scope:ltversion:1.0.2.66

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.126

Trust: 1.0

vendor:netgearmodel:mr60scope:ltversion:1.0.6.110

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.74

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.3.106

Trust: 1.0

vendor:netgearmodel:rax50scope:ltversion:1.0.2.66

Trust: 1.0

vendor:netgearmodel:ms60scope:ltversion:1.0.6.110

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.3.106

Trust: 1.0

vendor:ネットギアmodel:r8000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax75scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax45scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7900pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ms60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax50scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:mr60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r8000pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7960pscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017199 // NVD: CVE-2021-45540

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45540
value: HIGH

Trust: 1.0

cve@mitre.org: CVE-2021-45540
value: HIGH

Trust: 1.0

NVD: CVE-2021-45540
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202112-2356
value: HIGH

Trust: 0.6

VULMON: CVE-2021-45540
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-45540
severity: MEDIUM
baseScore: 5.2
vectorString: AV:A/AC:L/AU:S/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-45540
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.7
impactScore: 6.0
version: 3.1

Trust: 2.0

OTHER: JVNDB-2021-017199
baseSeverity: HIGH
baseScore: 8.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-45540 // JVNDB: JVNDB-2021-017199 // CNNVD: CNNVD-202112-2356 // NVD: CVE-2021-45540 // NVD: CVE-2021-45540

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017199 // NVD: CVE-2021-45540

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202112-2356

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202112-2356

PATCH

title:Security Advisory for Post-Authentication Command Injection on Some Routers and WiFi Systems, PSV-2020-0196url:https://kb.netgear.com/000064477/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0196

Trust: 0.8

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=176369

Trust: 0.6

sources: JVNDB: JVNDB-2021-017199 // CNNVD: CNNVD-202112-2356

EXTERNAL IDS

db:NVDid:CVE-2021-45540

Trust: 3.3

db:JVNDBid:JVNDB-2021-017199

Trust: 0.8

db:CNNVDid:CNNVD-202112-2356

Trust: 0.6

db:VULMONid:CVE-2021-45540

Trust: 0.1

sources: VULMON: CVE-2021-45540 // JVNDB: JVNDB-2021-017199 // CNNVD: CNNVD-202112-2356 // NVD: CVE-2021-45540

REFERENCES

url:https://kb.netgear.com/000064477/security-advisory-for-post-authentication-command-injection-on-some-routers-and-wifi-systems-psv-2020-0196

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45540

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45540 // JVNDB: JVNDB-2021-017199 // CNNVD: CNNVD-202112-2356 // NVD: CVE-2021-45540

SOURCES

db:VULMONid:CVE-2021-45540
db:JVNDBid:JVNDB-2021-017199
db:CNNVDid:CNNVD-202112-2356
db:NVDid:CVE-2021-45540

LAST UPDATE DATE

2024-11-23T21:58:37.132000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45540date:2022-01-06T00:00:00
db:JVNDBid:JVNDB-2021-017199date:2023-01-10T01:06:00
db:CNNVDid:CNNVD-202112-2356date:2022-01-10T00:00:00
db:NVDid:CVE-2021-45540date:2024-11-21T06:32:27.813

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45540date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017199date:2023-01-10T00:00:00
db:CNNVDid:CNNVD-202112-2356date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45540date:2021-12-26T01:15:14.890