2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-45674" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2021-12-26T01:15:21.193" ,
2024-11-23 15:12:23 +00:00
"lastModified" : "2024-11-21T06:32:51.063" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Certain NETGEAR devices are affected by stored XSS. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, and RAX80 before 1.0.3.106."
} ,
{
"lang" : "es" ,
"value" : "Determinados dispositivos NETGEAR est\u00e1n afectados por un ataque de tipo XSS almacenado. Esto afecta a R7000 versiones anteriores a 1.0.11.110, a R7900 versiones anteriores a 1.0.4.30, a R8000 versiones anteriores a 1.0.4.62, a RAX15 versiones anteriores a 1.0.2.82, a RAX20 versiones anteriores a 1.0.2.82, a RAX200 versiones anteriores a 1.0.3.106, a RAX75 versiones anteriores a 1.0.3.106 y a RAX80 versiones anteriores a 1.0.3.106"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-11-23 15:12:23 +00:00
"source" : "cve@mitre.org" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 15:12:23 +00:00
"vectorString" : "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
"baseScore" : 3.2 ,
"baseSeverity" : "LOW" ,
"attackVector" : "PHYSICAL" ,
"attackComplexity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
2024-11-23 15:12:23 +00:00
"exploitabilityScore" : 0.2 ,
2023-04-24 12:24:31 +02:00
"impactScore" : 2.7
} ,
{
2024-11-23 15:12:23 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-11-23 15:12:23 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
"baseScore" : 4.8 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
2024-11-23 15:12:23 +00:00
"exploitabilityScore" : 1.7 ,
2023-04-24 12:24:31 +02:00
"impactScore" : 2.7
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:S/C:N/I:P/A:N" ,
2024-11-23 15:12:23 +00:00
"baseScore" : 3.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 6.8 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.11.110" ,
"matchCriteriaId" : "82B05B23-A689-4A0A-8569-9FA7972EA663"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.4.30" ,
"matchCriteriaId" : "B6364559-B141-43AE-B40A-506B79BCC3AA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C484840F-AF30-4B5C-821A-4DB9BE407BDB"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.4.62" ,
"matchCriteriaId" : "A6C5E300-92E2-447A-822F-B95D1C59530E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B39F095-8FE8-43FD-A866-7B613B495984"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.82" ,
"matchCriteriaId" : "ED73C5EC-C8D3-4206-BCAA-0901F786DD98"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B624B4D3-BCF4-4F95-B401-A88BEC3145A5"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.2.82" ,
"matchCriteriaId" : "93EF1D39-E084-40E9-86CF-C590763841A0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7038703C-C79D-4DD4-8B16-E1A5FC6694C0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.3.106" ,
"matchCriteriaId" : "04513F08-329D-446F-A356-29074C1C0BEA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58EB0F2F-FB5C-47D9-9AE6-087AE517B3F9"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.3.106" ,
"matchCriteriaId" : "C0318AD0-52A7-490F-94C1-D07C97370D2C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BAA74D7-36A1-4494-96A2-BD0D2D6BF22F"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.3.106" ,
"matchCriteriaId" : "34D7AF28-F117-4E31-AED8-A3179B1BE182"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06B5A85C-3588-4263-B9AD-4E56D3F6CB16"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://kb.netgear.com/000064077/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2020-0017" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-23 15:12:23 +00:00
} ,
{
"url" : "https://kb.netgear.com/000064077/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-PSV-2020-0017" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}