{ "id": "CVE-2021-41449", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-09T14:15:12.563", "lastModified": "2021-12-13T18:04:38.783", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A path traversal attack in web interfaces of Netgear RAX35, RAX38, and RAX40 routers before v1.0.4.102, allows a remote unauthenticated attacker to gain access to sensitive restricted information, such as forbidden files of the web application, via sending a specially crafted HTTP packet." }, { "lang": "es", "value": "Un ataque de salto de ruta en las interfaces web de los routers Netgear RAX35, RAX38 y RAX40 versiones anteriores a v1.0.4.102, permite a un atacante remoto no autenticado conseguir acceso a informaci\u00f3n confidencial restringida, como archivos prohibidos de la aplicaci\u00f3n web, por medio del env\u00edo de un paquete HTTP especialmente dise\u00f1ado" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.4.102", "matchCriteriaId": "5F2DB747-540A-4C65-9729-0104357CA87A" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:netgear:rax35:-:*:*:*:*:*:*:*", "matchCriteriaId": "4201E4D6-4DDF-4EF3-902A-960DFFF7C9A4" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:netgear:rax38_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.4.102", "matchCriteriaId": "466B8B30-1D65-4A02-956C-D377B554025D" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:netgear:rax38:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDA02FAE-E0C9-402F-9E7D-69EEDCC80053" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.4.102", "matchCriteriaId": "99167432-45E7-4E21-9804-3C7FF8AD106A" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:*", "matchCriteriaId": "13D54346-4B03-4296-B050-04EB8CFCA732" } ] } ] } ], "references": [ { "url": "http://netgear.com", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://rax40.com", "source": "cve@mitre.org", "tags": [ "Broken Link" ] }, { "url": "https://kb.netgear.com/000064405/Security-Advisory-for-Path-Traversal-on-Some-Routers-PSV-2021-0268", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.netgear.com/about/security/", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] } ] }