2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-26914" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2020-10-09T07:15:17.120" ,
"lastModified" : "2020-10-16T17:34:18.607" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62."
} ,
{
"lang" : "es" ,
"value" : "Determinados dispositivos NETGEAR, est\u00e1n afectados por una inyecci\u00f3n de comandos por parte de un usuario autenticado. Esto afecta a D6200 versiones anteriores a 1.1.00.38, D7000 versiones anteriores a 1.0.1.78, JR6150 versiones anteriores a 1.0.1.24, R6020 versiones anteriores a 1.0.0.42, R6050 versiones anteriores a 1.0.1.24, R6080 versiones anteriores a 1.0.0.42, R6120 versiones anteriores a 1.0.0.66, R6220 versiones anteriores a 1.1.0.100, R6260 versiones anteriores a 1.1.0.64, R6700v2 versiones anteriores a 1.2.0.62, R6800 versiones anteriores a 1.2.0.62, R6900v2 versiones anteriores a 1.2.0.62, R7450 versiones anteriores a 1.2.0.62 y WNR2020 versiones anteriores a 1.1.0.62"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.1 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
} ,
{
"source" : "cve@mitre.org" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 6.7 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.5
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:A/AC:L/Au:S/C:P/I:P/A:P" ,
"accessVector" : "ADJACENT_NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 5.2
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 5.1 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.00.38" ,
"matchCriteriaId" : "ECB7FA55-54E2-467E-B825-EBBF907B22CC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "00E6A1B7-4732-4259-9B71-10FF0B56A16B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.78" ,
"matchCriteriaId" : "C539CF50-2AC3-45F9-8F69-FA2F50FAD92D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF04B65B-9685-4595-9C71-0F77AD7109BE"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.24" ,
"matchCriteriaId" : "9546CC36-0468-43B6-91C6-E4E8016DC082"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D67167E5-81D2-4892-AF41-CBB6271232D1"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.0.42" ,
"matchCriteriaId" : "DAD3FA3E-6629-4C40-B8DB-8CDF824A9E0D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5DDA7ABF-4C4B-4945-993A-F93BD8FCB55E"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.1.24" ,
"matchCriteriaId" : "B28D60A8-8096-4D00-B287-F639461B8BA8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "363D4DEE-98B9-4294-B241-1613CAD1A3A7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.0.42" ,
"matchCriteriaId" : "1CCD6658-5418-4FF3-B471-A482A9499487"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CEB5C49-53CF-44AE-9A7D-E7E6201BFE62"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.0.66" ,
"matchCriteriaId" : "BC964EED-3452-4D6F-8603-0A28988282FA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D18D2CCD-424F-41D5-919B-E22B9FA68D36"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.100" ,
"matchCriteriaId" : "79B24229-6AC2-489D-B542-4DAA7E630180"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B131B5C8-CB7F-433B-BA32-F05CE0E92A66"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.64" ,
"matchCriteriaId" : "16D72B7A-0707-428F-A9AE-5899EBF4BBA0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C395D49-57F9-4BC1-8619-57127355B86B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.62" ,
"matchCriteriaId" : "1A3E4091-5CDD-4C35-84B9-C4BAF2B8FA4F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9793286-86D2-43BF-B9B8-823C05BCAE4B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.62" ,
"matchCriteriaId" : "812D595B-5EDD-443F-8169-EF802C44DE2C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "09404083-B00B-4C1F-8085-BC242E625CA3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.62" ,
"matchCriteriaId" : "FF0079DC-7F71-4B0D-B9A9-3193F88723C0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9FC6398-60A5-4003-A294-C96AE6DBCED5"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.2.0.62" ,
"matchCriteriaId" : "C2428BDA-BF24-4CB7-8534-C7ADF96EF3DC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6DA5420D-DD64-4A9C-9B5F-784F0ED2B464"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.0.62" ,
"matchCriteriaId" : "E0141851-BE96-4F6A-883F-3B20AE6945C1"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C2189628-03E7-445A-9EF2-656A85539115"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://kb.netgear.com/000062339/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2019-0014" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
}
]
}