ID

VAR-202112-2421


CVE

CVE-2021-45527


TITLE

plural  NETGEAR  Classic buffer overflow vulnerability in device

Trust: 0.8

sources: JVNDB: JVNDB-2021-017285

DESCRIPTION

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.68, D6400 before 1.0.0.102, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, DC112A before 1.0.0.54, EX7000 before 1.0.1.94, EX7500 before 1.0.0.72, R6250 before 1.0.4.48, R6300v2 before 1.0.4.52, R6400 before 1.0.1.70, R6400v2 before 1.0.4.102, R6700v3 before 1.0.4.102, R7000 before 1.0.11.116, R7100LG before 1.0.0.64, R7850 before 1.0.5.68, R7900 before 1.0.4.30, R7960P before 1.4.1.68, R8000 before 1.0.4.52, RAX200 before 1.0.2.88, RBS40V before 2.6.2.4, RS400 before 1.5.1.80, XR300 before 1.0.3.56, R7000P before 1.3.2.124, R8000P before 1.4.1.68, R8500 before 1.0.2.144, RAX80 before 1.0.3.102, R6900P before 1.3.2.124, R7900P before 1.4.1.68, R8300 before 1.0.2.144, RAX75 before 1.0.3.102, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12. plural NETGEAR A classic buffer overflow vulnerability exists on the device.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This affects D6220 prior to 1.0.0.68, D6400 prior to 1.0.0.102, D7000v2 prior to 1.0.0.66, D8500 prior to 1.0.3.58, DC112A prior to 1.0.0.54, EX7000 prior to 1.0.1.94, EX7500 prior to 1.0.0.72, R6250 prior to 1.0.4.48, R6300v2 prior to 1.0.4.52, R6400 prior to 1.0.1.70, R6400v2 prior to 1.0.4.102, R6700v3 prior to 1.0.4.102, R7000 prior to 1.0.11.116, R7100LG prior to 1.0.0.64, R7850 prior to 1.0.5.68, R7900 prior to 1.0.4.30, R7960P prior to 1.4.1.68, R8000 prior to 1.0.4.52, RAX200 prior to 1.0.2.88, RBS40V prior to 2.6.2.4, RS400 prior to 1.5.1.80, XR300 prior to 1.0.3.56, R7000P prior to 1.3.2.124, R8000P prior to 1.4.1.68, R8500 prior to 1.0.2.144, RAX80 prior to 1.0.3.102, R6900P prior to 1.3.2.124, R7900P prior to 1.4.1.68, R8300 prior to 1.0.2.144, RAX75 prior to 1.0.3.102, RBR750 prior to 3.2.17.12, RBR850 prior to 3.2.17.12, RBS750 prior to 3.2.17.12, RBS850 prior to 3.2.17.12, RBK752 prior to 3.2.17.12, and RBK852 prior to 3.2.17.12

Trust: 1.71

sources: NVD: CVE-2021-45527 // JVNDB: JVNDB-2021-017285 // VULMON: CVE-2021-45527

AFFECTED PRODUCTS

vendor:netgearmodel:rbr750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.52

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.2.124

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.70

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:dc112ascope:ltversion:1.0.0.54

Trust: 1.0

vendor:netgearmodel:rbs40vscope:ltversion:2.6.2.4

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.64

Trust: 1.0

vendor:netgearmodel:rbk752scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:r8300scope:ltversion:1.0.2.144

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.1.68

Trust: 1.0

vendor:netgearmodel:ex7000scope:ltversion:1.0.1.94

Trust: 1.0

vendor:netgearmodel:rbk852scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.2.124

Trust: 1.0

vendor:netgearmodel:d7000v2scope:ltversion:1.0.0.66

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:ex7500scope:ltversion:1.0.0.72

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.116

Trust: 1.0

vendor:netgearmodel:r7850scope:ltversion:1.0.5.68

Trust: 1.0

vendor:netgearmodel:xr300scope:ltversion:1.0.3.56

Trust: 1.0

vendor:netgearmodel:r8500scope:ltversion:1.0.2.144

Trust: 1.0

vendor:netgearmodel:r6300v2scope:ltversion:1.0.4.52

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.1.68

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.68

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.3.102

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.1.80

Trust: 1.0

vendor:netgearmodel:r6250scope:ltversion:1.0.4.48

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.102

Trust: 1.0

vendor:netgearmodel:r7900scope:ltversion:1.0.4.30

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.1.68

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.3.102

Trust: 1.0

vendor:netgearmodel:d8500scope:ltversion:1.0.3.58

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:3.2.17.12

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.2.88

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.4.102

Trust: 1.0

vendor:netgearmodel:r6700v3scope:ltversion:1.0.4.102

Trust: 1.0

vendor:ネットギアmodel:d6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d8500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6220scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk752scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7000v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbk852scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-017285 // NVD: CVE-2021-45527

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-45527
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2021-45527
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-45527
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202112-2341
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2021-45527
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-45527
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-45527
baseSeverity: CRITICAL
baseScore: 9.6
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-45527
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-017285 // CNNVD: CNNVD-202112-2341 // NVD: CVE-2021-45527 // NVD: CVE-2021-45527

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-017285 // NVD: CVE-2021-45527

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202112-2341

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202112-2341

PATCH

title:Security Advisory for Post-Authentication Buffer Overflow on Some Routers, Extenders, and WiFi Systems, PSV-2020-0437url:https://kb.netgear.com/000064493/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0437

Trust: 0.8

title:Netgear RBR750 and NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177093

Trust: 0.6

sources: JVNDB: JVNDB-2021-017285 // CNNVD: CNNVD-202112-2341

EXTERNAL IDS

db:NVDid:CVE-2021-45527

Trust: 3.3

db:JVNDBid:JVNDB-2021-017285

Trust: 0.8

db:CNNVDid:CNNVD-202112-2341

Trust: 0.6

db:VULMONid:CVE-2021-45527

Trust: 0.1

sources: VULMON: CVE-2021-45527 // JVNDB: JVNDB-2021-017285 // CNNVD: CNNVD-202112-2341 // NVD: CVE-2021-45527

REFERENCES

url:https://kb.netgear.com/000064493/security-advisory-for-post-authentication-buffer-overflow-on-some-routers-extenders-and-wifi-systems-psv-2020-0437

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-45527

Trust: 1.4

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2021-45527 // JVNDB: JVNDB-2021-017285 // CNNVD: CNNVD-202112-2341 // NVD: CVE-2021-45527

SOURCES

db:VULMONid:CVE-2021-45527
db:JVNDBid:JVNDB-2021-017285
db:CNNVDid:CNNVD-202112-2341
db:NVDid:CVE-2021-45527

LAST UPDATE DATE

2024-11-23T22:40:38.015000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-45527date:2021-12-27T00:00:00
db:JVNDBid:JVNDB-2021-017285date:2023-01-13T05:03:00
db:CNNVDid:CNNVD-202112-2341date:2022-01-11T00:00:00
db:NVDid:CVE-2021-45527date:2024-11-21T06:32:25.610

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-45527date:2021-12-26T00:00:00
db:JVNDBid:JVNDB-2021-017285date:2023-01-13T00:00:00
db:CNNVDid:CNNVD-202112-2341date:2021-12-26T00:00:00
db:NVDid:CVE-2021-45527date:2021-12-26T01:15:14.207