2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-20171" ,
"sourceIdentifier" : "vulnreport@tenable.com" ,
"published" : "2021-12-30T22:15:09.657" ,
"lastModified" : "2022-01-11T14:36:09.337" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device."
} ,
{
"lang" : "es" ,
"value" : "Netgear RAX43 versi\u00f3n 1.0.3.96, almacena informaci\u00f3n confidencial en texto plano. Todos los nombres de usuario y contrase\u00f1as de los servicios asociados al dispositivo se almacenan en texto plano en el dispositivo. Por ejemplo, la contrase\u00f1a de administrador se almacena en texto plano en el archivo de configuraci\u00f3n principal del dispositivo."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.5 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 2.1
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-312"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax43_firmware:1.0.3.96:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "411B548E-2E7F-4791-A75C-694AD7614E39"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "178BB386-F66C-4CE8-9283-37D22B304691"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://www.tenable.com/security/research/tra-2021-55" ,
"source" : "vulnreport@tenable.com" ,
"tags" : [
"Third Party Advisory"
]
}
]
}