2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-38519" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2021-08-11T00:15:40.490" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T06:17:18.863" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6250 before 1.0.4.36, R6300v2 before 1.0.4.36, R6400 before 1.0.1.50, R6400v2 before 1.0.2.66, R6700v3 before 1.0.2.66, R6700 before 1.0.2.8, R6900 before 1.0.2.8, R7000 before 1.0.9.88, R6900P before 1.3.2.132, R7100LG before 1.0.0.52, R7900 before 1.0.3.10, R8000 before 1.0.4.46, R7900P before 1.4.1.50, R8000P before 1.4.1.50, and RAX80 before 1.0.1.40."
} ,
{
"lang" : "es" ,
"value" : "Determinados dispositivos NETGEAR est\u00e1n afectados por una inyecci\u00f3n de comandos por un usuario autenticado. Esto afecta a R6250 versiones anteriores a 1.0.4.36, R6300v2 versiones anteriores a 1.0.4.36, R6400 versiones anteriores a 1.0.1.50, R6400v2 versiones anteriores a 1.0.2.66, R6700v3 versiones anteriores a 1.0.2.66, R6700 versiones anteriores a 1.0.2.8, R6900 versiones anteriores a 1.0.2.8, R7000 versiones anteriores a 1.0.9.88. 0.9.88, R6900P versiones anteriores a 1.3.2.132, R7100LG versiones anteriores a 1.0.0.52, R7900 versiones anteriores a 1.0.3.10, R8000 versiones anteriores a 1.0.4.46, R7900P versiones anteriores a 1.4.1.50, R8000P versiones anteriores a 1.4.1.50 y RAX80 versiones anteriores a 1.0.1.40"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "cve@mitre.org" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" ,
"baseScore" : 6.3 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "LOCAL" ,
2023-04-24 12:24:31 +02:00
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "LOW"
2023-04-24 12:24:31 +02:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 0.8 ,
"impactScore" : 5.5
2023-04-24 12:24:31 +02:00
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "NETWORK" ,
2023-04-24 12:24:31 +02:00
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
2023-04-24 12:24:31 +02:00
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.4.36" ,
"matchCriteriaId" : "C7557B61-37BD-4070-BACC-2D117210CC68"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "321BE843-52C4-4638-A321-439CA7B3A6F2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.4.36" ,
"matchCriteriaId" : "F20C9CA7-6DC4-4AEA-9A2C-F2CFD97923EE"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10938043-F7DF-42C3-8C16-F92CAF8E5576"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.50" ,
"matchCriteriaId" : "27C41AA7-C24A-49C6-98D9-B1CB2173705F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3E4CDF6B-3829-44D0-9675-71D7BE83CAA2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.66" ,
"matchCriteriaId" : "D075FD21-C022-4246-8465-4EF79BADD29C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "52AE9AD2-BC8D-477D-A3D3-891AE52FA5F3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.66" ,
"matchCriteriaId" : "B98D6EA5-F107-45C6-9312-BEE78B4644A9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6700:v3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5A09A9E8-8C77-4EDB-9483-B3C540EF083A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.8" ,
"matchCriteriaId" : "64C3A900-C9B1-4D4A-B62E-810DC705DC47"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "21B27F11-4262-4CE1-8107-B365A7C152F2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.8" ,
"matchCriteriaId" : "F7A5B4B9-59B9-44EE-86C7-099F4F94236D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0794BB7C-1BCF-4F08-8EB2-9C3B150C105A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.9.88" ,
"matchCriteriaId" : "A1FA71CB-0E14-4CBE-99BC-FD94FF4E4FBD"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.3.2.132" ,
"matchCriteriaId" : "839A9EBE-5F14-4695-8040-7D5607F8E248"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C41908FF-AE64-4949-80E3-BEE061B2DA8A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.0.52" ,
"matchCriteriaId" : "8F363604-1D1A-4FA2-9EE4-B19645DD35B6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "366FA778-3C2A-42AF-9141-DAD7043B406C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.3.10" ,
"matchCriteriaId" : "345471CB-D008-429E-84BE-582C881AEE2E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C484840F-AF30-4B5C-821A-4DB9BE407BDB"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.4.46" ,
"matchCriteriaId" : "35801B9D-59EA-4E23-8460-F2AAD4B4DEB0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B39F095-8FE8-43FD-A866-7B613B495984"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.4.1.50" ,
"matchCriteriaId" : "8B02CB0A-BBB8-4A64-93B3-7CA1DF7B7299"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F3D6A70D-66AF-4064-9F1B-4358D4B1F016"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.4.1.50" ,
"matchCriteriaId" : "9D3F1622-F2B7-41F0-87F0-61F4ACB270C8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F7EF872D-2537-4FEB-8799-499FC9D44339"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.40" ,
"matchCriteriaId" : "F77B2C93-9FC4-400E-A1FF-9F7EFA5D5DAD"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06B5A85C-3588-4263-B9AD-4E56D3F6CB16"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://kb.netgear.com/000063762/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0564" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://kb.netgear.com/000063762/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0564" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}