2025-02-19 17:04:22 +00:00

72 lines
3.0 KiB
JSON

{
"id": "CVE-2022-41545",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T18:15:13.450",
"lastModified": "2025-02-19T15:15:11.890",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack."
},
{
"lang": "es",
"value": "La interfaz web administrativa de NetGear C7800 router con la versi\u00f3n de firmware 6.01.07 (y posiblemente otras) autentica a los usuarios mediante autenticaci\u00f3n b\u00e1sica, con un encabezado HTTP que contiene un valor base64 del nombre de usuario y la contrase\u00f1a en texto plano. Debido a que el servidor web tampoco utiliza seguridad de transporte de manera predeterminada, esto hace que las credenciales administrativas sean vulnerables a escuchas clandestinas por parte de un adversario durante cada solicitud autenticada que realiza un cliente al router a trav\u00e9s de una red inal\u00e1mbrica (WLAN) o una red local (LAN), en caso de que el adversario pueda realizar un ataque de intermediario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://seclists.org/fulldisclosure/2025/Feb/12",
"source": "cve@mitre.org"
},
{
"url": "https://www.netgear.com/about/security/",
"source": "cve@mitre.org"
},
{
"url": "https://www.netgear.com/images/datasheet/networking/cablemodems/C7800.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Feb/12",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}