ID

VAR-202309-0028


CVE

CVE-2023-36187


TITLE

Classic buffer overflow vulnerability in multiple Netgear products

Trust: 0.8

sources: JVNDB: JVNDB-2023-011580

DESCRIPTION

Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote unauthenticated attackers to execute arbitrary code via crafted URL to httpd. CBR40 firmware, LAX20 firmware, MK62 A classic buffer overflow vulnerability exists in multiple Netgear products, including firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-36187 // JVNDB: JVNDB-2023-011580 // VULMON: CVE-2023-36187

AFFECTED PRODUCTS

vendor:netgearmodel:r6700v3scope:ltversion:1.0.4.118

Trust: 1.0

vendor:netgearmodel:lax20scope:ltversion:1.1.6.34

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.70

Trust: 1.0

vendor:netgearmodel:cbr40scope:ltversion:2.5.0.24

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.3.148

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.4.120

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.130

Trust: 1.0

vendor:netgearmodel:mr60scope:ltversion:1.1.6.122

Trust: 1.0

vendor:netgearmodel:rbw30scope:ltversion:2.6.2.6

Trust: 1.0

vendor:netgearmodel:ms60scope:ltversion:1.1.6.122

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.4.120

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.4.118

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.1.86

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.4.120

Trust: 1.0

vendor:netgearmodel:mk62scope:ltversion:1.1.6.122

Trust: 1.0

vendor:ネットギアmodel:lax20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:mk62scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ms60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:mr60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax200scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6700v3scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbr40scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rs400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rax75scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbw30scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6400v2scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-011580 // NVD: CVE-2023-36187

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-36187
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-36187
value: CRITICAL

Trust: 0.8

nvd@nist.gov: CVE-2023-36187
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2023-36187
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-011580 // NVD: CVE-2023-36187

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-011580 // NVD: CVE-2023-36187

EXTERNAL IDS

db:NVDid:CVE-2023-36187

Trust: 2.7

db:JVNDBid:JVNDB-2023-011580

Trust: 0.8

db:VULMONid:CVE-2023-36187

Trust: 0.1

sources: VULMON: CVE-2023-36187 // JVNDB: JVNDB-2023-011580 // NVD: CVE-2023-36187

REFERENCES

url:https://kb.netgear.com/000065571/security-advisory-for-pre-authentication-buffer-overflow-on-some-routers-psv-2020-0578

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2023-36187

Trust: 0.8

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-36187 // JVNDB: JVNDB-2023-011580 // NVD: CVE-2023-36187

SOURCES

db:VULMONid:CVE-2023-36187
db:JVNDBid:JVNDB-2023-011580
db:NVDid:CVE-2023-36187

LAST UPDATE DATE

2024-08-14T14:09:50.074000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-36187date:2023-09-01T00:00:00
db:JVNDBid:JVNDB-2023-011580date:2023-12-13T07:53:00
db:NVDid:CVE-2023-36187date:2023-09-07T17:05:35.237

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-36187date:2023-09-01T00:00:00
db:JVNDBid:JVNDB-2023-011580date:2023-12-13T00:00:00
db:NVDid:CVE-2023-36187date:2023-09-01T16:15:08.020