2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-45511" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2021-12-26T01:15:13.437" ,
2024-11-23 15:12:23 +00:00
"lastModified" : "2024-11-21T06:32:23.030" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Certain NETGEAR devices are affected by authentication bypass. This affects AC2100 before 2021-08-27, AC2400 before 2021-08-27, AC2600 before 2021-08-27, D7000 before 2021-08-27, R6220 before 2021-08-27, R6230 before 2021-08-27, R6260 before 2021-08-27, R6330 before 2021-08-27, R6350 before 2021-08-27, R6700v2 before 2021-08-27, R6800 before 2021-08-27, R6850 before 2021-08-27, R6900v2 before 2021-08-27, R7200 before 2021-08-27, R7350 before 2021-08-27, R7400 before 2021-08-27, and R7450 before 2021-08-27."
} ,
{
"lang" : "es" ,
"value" : "Determinados dispositivos NETGEAR est\u00e1n afectados por una omisi\u00f3n de autenticaci\u00f3n. Esto afecta a AC2100 versiones anteriores a 2021-08-27, AC2400 versiones anteriores a 2021-08-27, AC2600 versiones anteriores a 2021-08-27, D7000 versiones anteriores a 2021-08-27, R6220 versiones anteriores a 2021-08-27, R6230 versiones anteriores a 2021-08-27, R6260 versiones anteriores a 2021-08-27, R6330 versiones anteriores a 2021-08-27, R6350 versiones anteriores al 2021-08-27, R6700v2 versiones anteriores al 2021-08-27, R6800 versiones anteriores al 2021-08-27, R6850 versiones anteriores al 2021-08-27, R6900v2 versiones anteriores al 2021-08-27, R7200 versiones anteriores al 2021-08-27, R7350 versiones anteriores al 2021-08-27, R7400 versiones anteriores al 2021-08-27 y R7450 versiones anteriores al 2021-08-27"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-11-23 15:12:23 +00:00
"source" : "cve@mitre.org" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 15:12:23 +00:00
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 6.8 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "ADJACENT_NETWORK" ,
2023-04-24 12:24:31 +02:00
"attackComplexity" : "LOW" ,
2024-11-23 15:12:23 +00:00
"privilegesRequired" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-11-23 15:12:23 +00:00
"exploitabilityScore" : 0.9 ,
2023-04-24 12:24:31 +02:00
"impactScore" : 5.9
} ,
{
2024-11-23 15:12:23 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 15:12:23 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
"attackVector" : "NETWORK" ,
2023-04-24 12:24:31 +02:00
"attackComplexity" : "LOW" ,
2024-11-23 15:12:23 +00:00
"privilegesRequired" : "NONE" ,
2023-04-24 12:24:31 +02:00
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-11-23 15:12:23 +00:00
"exploitabilityScore" : 3.9 ,
2023-04-24 12:24:31 +02:00
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-23 15:12:23 +00:00
"baseScore" : 10.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "45F7CAB5-C621-4BE5-A1A0-067D3A6782DE"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A80B06A1-81B5-4C33-89F6-EC3F6E3068B5"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "EC90E98D-970F-405E-BD0F-87C569F3235E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B25A18F-DD96-45FE-B098-71E60CB0FFFE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "F716D30E-8A2C-4C99-951A-6AF94F467DBB"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2BFCD9A8-1846-48C4-9F14-3866E983FB74"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.80" ,
"matchCriteriaId" : "C74AB12E-2C62-488D-BD5E-DB2B4C174D91"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF04B65B-9685-4595-9C71-0F77AD7109BE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.110" ,
"matchCriteriaId" : "894177B3-FEFC-450C-AB87-BAE985769719"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B131B5C8-CB7F-433B-BA32-F05CE0E92A66"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.110" ,
"matchCriteriaId" : "4EB2CDDD-4C4A-48CC-A6E6-03561C928F71"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C91CADFA-59DB-4B6C-A914-848884F4A4BD"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.84" ,
"matchCriteriaId" : "A194A033-7DAD-470E-B07B-050B4761C3C5"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C395D49-57F9-4BC1-8619-57127355B86B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6330_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.84" ,
"matchCriteriaId" : "C9652293-61FB-40DA-8C34-F347552D4CA6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6330:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D621D26D-B144-424A-A9CB-19488399ACC1"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.84" ,
"matchCriteriaId" : "38890775-308B-49B6-A3B7-A7EE4C4CB696"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B302909-29CF-4E53-9CCB-8664D3FCB03A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "A211653B-5485-41F5-9873-E610FEBB59E8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9793286-86D2-43BF-B9B8-823C05BCAE4B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "D3D3DAA9-7067-4BB1-B7C8-46127F427F2C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "09404083-B00B-4C1F-8085-BC242E625CA3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.84" ,
"matchCriteriaId" : "3F7CC681-B1DB-469F-A62F-EA3E3A00C1F3"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "598B48C5-4706-4431-8C5A-DA496DD1052F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "13331B0F-038B-4652-A986-A2CE7E5C8144"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9FC6398-60A5-4003-A294-C96AE6DBCED5"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7200_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "E65B4BD2-D7DE-4F0C-998A-29B3A237B81D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7200:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FECB83F9-D417-4FD3-B293-87BC177E3AEB"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7350_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "F9A326D3-C31E-4722-A7D5-593371D90538"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7350:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AFD1A65C-F10F-4C52-8B6D-69992E512EB5"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7400_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "413E21F8-0C60-4F94-9FAD-D71C14C1A30E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7400:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1F68AC3B-A31F-4AB0-89E9-BFFDE427AD3B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.88" ,
"matchCriteriaId" : "35E5B11C-0BD8-44AC-8B49-6BA6F3DD9D9D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6DA5420D-DD64-4A9C-9B5F-784F0ED2B464"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://kb.netgear.com/000063961/Security-Advisory-for-Authentication-Bypass-Vulnerability-on-the-D7000-and-Some-Routers-PSV-2021-0133" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-23 15:12:23 +00:00
} ,
{
"url" : "https://kb.netgear.com/000063961/Security-Advisory-for-Authentication-Bypass-Vulnerability-on-the-D7000-and-Some-Routers-PSV-2021-0133" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}