René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

334 lines
9.5 KiB
JSON

{
"id": "CVE-2021-45645",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-26T01:15:19.877",
"lastModified": "2022-01-07T17:02:10.560",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects RBS50Y before 2.7.0.122, SRK60 before 2.7.0.122, SRR60 before 2.7.0.122, SRS60 before 2.7.0.122, SXK30 before 3.2.33.108, SXR30 before 3.2.33.108, SXS30 before 3.2.33.108, and SRC60 before 2.7.0.122."
},
{
"lang": "es",
"value": "Determinados dispositivos NETGEAR est\u00e1n afectados por la configuraci\u00f3n incorrecta de los ajustes de seguridad. Esto afecta a RBS50Y versiones anteriores a 2.7.0.122, SRK60 versiones anteriores a 2.7.0.122, SRR60 versiones anteriores a 2.7.0.122, SRS60 versiones anteriores a 2.7.0.122, SXK30 versiones anteriores a 3.2.33.108, SXR30 versiones anteriores a 3.2.33.108, SXS30 versiones anteriores a 3.2.33.108 y SRC60 versiones anteriores a 2.7.0.122"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rbs50y_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0.122",
"matchCriteriaId": "C686FAAA-E94E-4F1F-B764-D700ECEB37EB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rbs50y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27F93A76-6EFF-4DA6-9129-4792E2C125D4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:srk60_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0.122",
"matchCriteriaId": "1EDA1489-219A-4FC8-B7AB-3E032C66DDA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:srk60:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCC347EB-699E-4626-A944-2D378101DDCF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:srr60_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0.122",
"matchCriteriaId": "31E644AC-70F0-440B-A288-5726D3818B51"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:srr60:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55E6F589-04DA-431C-9E03-BA2A59BB0E4A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:srs60_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0.122",
"matchCriteriaId": "306E7460-4916-43B7-B0F6-571C5D7E88A0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:srs60:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB01247-A20F-41CA-8718-E8E60E7F14B3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:sxk30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.33.108",
"matchCriteriaId": "E2F935DE-13A5-4BEF-AC6B-7DE7427F634A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:sxk30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A233D4C9-DD0E-40EB-AAF5-771F8108586C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:sxr30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.33.108",
"matchCriteriaId": "49BE78F8-75F3-4F6F-B3E7-57E84BBB0DA9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:sxr30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FDDCE8B-FD84-4005-AF69-A1AC26D23E28"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:sxs30_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.33.108",
"matchCriteriaId": "4DC91433-BA5A-4770-BC0D-333DEA734A2F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:sxs30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1834FB75-232D-4B54-96AA-8536D40BC042"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:src60_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.0.122",
"matchCriteriaId": "E97D76C4-0529-4E2B-B3F5-729FAF60238A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:src60:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE67D9E-2EB2-4DE5-B245-71C370C002B1"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000064530/Security-Advisory-for-Security-Misconfiguration-on-Some-WiFi-Systems-PSV-2021-0127",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}