2024-12-08 03:06:42 +00:00

114 lines
3.5 KiB
JSON

{
"id": "CVE-2021-20172",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2021-12-30T22:15:09.707",
"lastModified": "2024-11-21T05:46:03.773",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All known versions of the Netgear Genie Installer for macOS contain a local privilege escalation vulnerability. The installer of the macOS version of Netgear Genie handles certain files in an insecure way. A malicious actor who has local access to the endpoint on which the software is going to be installed may overwrite certain files to obtain privilege escalation to root."
},
{
"lang": "es",
"value": "Todas las versiones conocidas del instalador de Netgear Genie para macOS contienen una vulnerabilidad de escalada de privilegios local. El instalador de la versi\u00f3n de Netgear Genie para macOS maneja determinados archivos de forma no segura. Un actor malicioso que tenga acceso local al endpoint en el que va a instalarse el software puede sobrescribir determinados archivos para obtener una escalada de privilegios a root.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 7.2,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netgear:genie_installer:-:*:*:*:*:macos:*:*",
"matchCriteriaId": "4E6BAA11-4E8D-47F5-94B1-E412F7FA8ECF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2021-56",
"source": "vulnreport@tenable.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2021-56",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}