2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-45603" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2021-12-26T01:15:17.853" ,
2024-11-23 15:12:23 +00:00
"lastModified" : "2024-11-21T06:32:38.527" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Certain NETGEAR devices are affected by disclosure of sensitive information. A UPnP request reveals a device's serial number, which can be used for a password reset. This affects D7800 before 1.0.1.66, EX2700 before 1.0.1.68, WN3000RPv2 before 1.0.0.90, WN3000RPv3 before 1.0.2.100, LBR1020 before 2.6.5.20, LBR20 before 2.6.5.32, R6700AX before 1.0.10.110, R7800 before 1.0.2.86, R8900 before 1.0.5.38, R9000 before 1.0.5.38, RAX10 before 1.0.10.110, RAX120v1 before 1.2.3.28, RAX120v2 before 1.2.3.28, RAX70 before 1.0.10.110, RAX78 before 1.0.10.110, XR450 before 2.3.2.130, XR500 before 2.3.2.130, and XR700 before 1.0.1.46."
} ,
{
"lang" : "es" ,
"value" : "Determinados dispositivos NETGEAR est\u00e1n afectados por una divulgaci\u00f3n de informaci\u00f3n confidencial. Una petici\u00f3n UPnP revela el n\u00famero de serie de un dispositivo, que puede ser usado para restablecer la contrase\u00f1a. Esto afecta a D7800 versiones anteriores a 1.0.1.66, a EX2700 versiones anteriores a 1.0.1.68, al WN3000RPv2 versiones anteriores a 1.0.0.90, al WN3000RPv3 versiones anteriores a 1.0.2.100, a LBR1020 versiones anteriores a 2.6.5.20, a LBR20 versiones anteriores a 2.6.5.32, a R6700AX versiones anteriores a 1.0.10.110, a R7800 versiones anteriores a 1.0.2.86, a R8900 versiones anteriores a 1. 0.5.38, R9000 versiones anteriores a 1.0.5.38, RAX10 versiones anteriores a 1.0.10.110, RAX120v1 versiones anteriores a 1.2.3.28, RAX120v2 versiones anteriores a 1.2.3.28, RAX70 versiones anteriores a 1.0.10.110, RAX78 versiones anteriores a 1.0.10.110, XR450 versiones anteriores a 2.3.2.130, XR500 versiones anteriores a 2.3.2.130 y XR700 versiones anteriores a 1.0.1.46"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-11-23 15:12:23 +00:00
"source" : "cve@mitre.org" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 15:12:23 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" ,
"baseScore" : 6.1 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "LOW"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.8 ,
2024-11-23 15:12:23 +00:00
"impactScore" : 4.2
2023-04-24 12:24:31 +02:00
} ,
{
2024-11-23 15:12:23 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 15:12:23 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
"baseScore" : 5.5 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.8 ,
2024-11-23 15:12:23 +00:00
"impactScore" : 3.6
2023-04-24 12:24:31 +02:00
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-23 15:12:23 +00:00
"baseScore" : 2.1 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-200"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.66" ,
"matchCriteriaId" : "EBB7728E-4535-4A67-9F8F-3CD4FE29C4A9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA2D4987-3726-4A72-8D32-592F59FAC46D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:ex2700_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.68" ,
"matchCriteriaId" : "110B4669-7AA6-4444-BFEF-9F7DF5C40D0B"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:ex2700:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5341B659-DE7D-43F1-954D-82049CBE18AD"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:wn3000rpv2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.0.90" ,
"matchCriteriaId" : "A7305D0F-6995-411B-BDF6-106102C717AB"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:wn3000rpv2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50BC8FA2-F9D5-4286-97DD-BD2A55EA234D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:wn3000rpv3_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.100" ,
"matchCriteriaId" : "28C0758E-2793-4342-AEA0-DA7F49C4A38E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:wn3000rpv3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "958243A2-6829-464F-80EA-7DD5B6F0DD7A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:lbr1020_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.6.5.20" ,
"matchCriteriaId" : "05E6F6DD-5CC6-426B-92F5-34B9A8525810"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:lbr1020:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "953F0743-4B34-4CE9-815E-D87253720CBE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:lbr20_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.6.5.32" ,
"matchCriteriaId" : "8AAD88A5-E90E-4A96-BE01-DF14ADC44881"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:lbr20:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "863E45EA-2DA0-4C9A-9B87-79E42B3FF97C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6700ax_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.10.110" ,
"matchCriteriaId" : "C65624DD-9DDF-4167-89D9-8629587082A6"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6700ax:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9B37178-0C67-4EF0-A9B8-5BB5B9DBFB8F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.86" ,
"matchCriteriaId" : "76FAB8C7-79BA-4592-AF47-198D3EE48DCF"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17CF7445-6950-45FE-9D1A-E23F63316329"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.5.38" ,
"matchCriteriaId" : "13593203-FB80-4BDA-96CC-AAE5C33E560A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F859165-8D89-4CDD-9D48-9C7923D2261F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.5.38" ,
"matchCriteriaId" : "4D90EEE2-4D7C-46ED-9DF4-C232F30D97ED"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D74F1BFC-562E-4E7D-BBAB-2F8B593B5A57"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax10_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.10.110" ,
"matchCriteriaId" : "FB930C5E-4232-4212-AFEB-A4D0904F2B22"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax10:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1742F1BB-3D78-4E5E-9479-6614A56B4700"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax120v1_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.3.28" ,
"matchCriteriaId" : "E370208B-8A35-4F76-8C79-BD5F1ABECA4D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax120v1:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "774148F4-42EA-4F2A-98AB-1511DAB5774A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax120v2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.3.28" ,
"matchCriteriaId" : "91CED146-E9DC-4F73-A2CF-A6D78F29D0F7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax120v2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50D741E6-43F9-4BDC-B1A4-281AC73A7C19"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax70_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.10.110" ,
"matchCriteriaId" : "EE615E08-904D-4DD5-835F-CE48B6D87650"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax70:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE1314C3-4950-4F5A-9900-789710CE7F98"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax78_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.10.110" ,
"matchCriteriaId" : "A4940E3E-2320-4B73-B5DB-DDB7BE410EF0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax78:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EABDFEEF-228C-429E-9B80-B6A0CA7D5AA9"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:xr450_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.3.2.130" ,
"matchCriteriaId" : "1EC1DFC6-B5A7-486B-BD50-BB79B3FF368A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:xr450:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "66B9CE4D-D1EC-4F55-8226-D159CF5F3AB6"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.3.2.130" ,
"matchCriteriaId" : "E50B1D80-6C4A-488D-8CAC-638DFFE23E6F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E203D92-F97B-4F5B-B395-3A5DEDBF1C1C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.46" ,
"matchCriteriaId" : "E3539C94-0B31-48FC-A432-3DC3E4E0CBBC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E12892C8-5E01-49A6-BF47-09D630377093"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://immersivelabs.com/resources/blog/netgear-vulnerabilities-could-put-small-business-routers-at-risk/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://kb.netgear.com/000064407/Security-Advisory-for-Post-Authentication-Command-Injection-Sensitive-Information-Disclosure-on-Multiple-Products-PSV-2021-0169-PSV-2021-0171" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-23 15:12:23 +00:00
} ,
{
"url" : "https://immersivelabs.com/resources/blog/netgear-vulnerabilities-could-put-small-business-routers-at-risk/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://kb.netgear.com/000064407/Security-Advisory-for-Post-Authentication-Command-Injection-Sensitive-Information-Disclosure-on-Multiple-Products-PSV-2021-0169-PSV-2021-0171" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}