2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-38524" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2021-08-11T00:16:04.523" ,
"lastModified" : "2021-08-19T11:57:07.503" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX45 before 1.0.2.32, RAX50 before 1.0.2.32, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, and RBS750 before 3.2.16.6."
} ,
{
"lang" : "es" ,
"value" : "Determinados dispositivos NETGEAR est\u00e1n afectados por un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria por un usuario autenticado. Esto afecta a MK62 versiones anteriores a 1.0.6.110, MR60 versiones anteriores a 1.0.6.110, MS60 versiones anteriores a 1.0.6.110, RAX15 versiones anteriores a 1.0.2.82, RAX20 versiones anteriores a 1.0.2.82, RAX200 versiones anteriores a 1.0.3.106, RAX45 versiones anteriores a 1. 0.2.32, RAX50 versiones anteriores a 1.0.2.32, RAX75 versiones anteriores a 1.0.3.106, RAX80 versiones anteriores a 1.0.3.106, RBK752 versiones anteriores a 3.2.16.6, RBR750 versiones anteriores a 3.2.16.6 y RBS750 versiones anteriores a 3.2.16.6"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 4.9 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 3.6
} ,
{
"source" : "cve@mitre.org" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 4.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 0.9 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 4.0
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.6.110" ,
"matchCriteriaId" : "525B767F-5A8A-4E6C-8585-BCBB05948B2D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "69A79475-37BE-47BD-A629-DCEF22500B0B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.6.110" ,
"matchCriteriaId" : "6F1EBAB4-F713-4AC5-AECC-9E9D61FF3576"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "65BB3ECD-2F0B-4625-A1DB-F6CEFC46E277"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.6.110" ,
"matchCriteriaId" : "9E445DBA-2B45-410C-9288-1A4472452CE1"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F003F064-591C-4D7C-9EC4-D0E553BC6683"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.82" ,
"matchCriteriaId" : "ED73C5EC-C8D3-4206-BCAA-0901F786DD98"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B624B4D3-BCF4-4F95-B401-A88BEC3145A5"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.82" ,
"matchCriteriaId" : "93EF1D39-E084-40E9-86CF-C590763841A0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7038703C-C79D-4DD4-8B16-E1A5FC6694C0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.3.106" ,
"matchCriteriaId" : "04513F08-329D-446F-A356-29074C1C0BEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58EB0F2F-FB5C-47D9-9AE6-087AE517B3F9"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.32" ,
"matchCriteriaId" : "05363CF1-17DA-4462-9C68-2790FE70D539"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B08BD69-CDCC-4CEB-B887-4E47D2B45D26"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.32" ,
"matchCriteriaId" : "41D61A7C-BF7E-4A84-A08B-C9FF449AF952"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C430976E-24C0-4EA7-BF54-F9C188AB9C01"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.3.106" ,
"matchCriteriaId" : "C0318AD0-52A7-490F-94C1-D07C97370D2C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BAA74D7-36A1-4494-96A2-BD0D2D6BF22F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.3.106" ,
"matchCriteriaId" : "34D7AF28-F117-4E31-AED8-A3179B1BE182"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06B5A85C-3588-4263-B9AD-4E56D3F6CB16"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.2.16.6" ,
"matchCriteriaId" : "FDD03FFF-ECAF-4527-A195-559DF479A0F2"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A45832BD-114D-42F1-B9F1-7532496D30A6"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.2.16.6" ,
"matchCriteriaId" : "05A46FA9-5DC8-4408-B4C2-AD5F1CABE7C1"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C13F5C69-FA9B-472A-9036-0C2967BDCDE9"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.2.16.6" ,
"matchCriteriaId" : "2C144D71-6C10-44CD-BFF9-907A92F0432C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B529194C-C440-4BC3-850F-0613FC548F86"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://kb.netgear.com/000063779/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2020-0225" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
}
]
}