René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

334 lines
9.5 KiB
JSON

{
"id": "CVE-2021-45637",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-26T01:15:19.507",
"lastModified": "2022-01-07T18:52:51.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects R6260 before 1.1.0.76, R6800 before 1.2.0.62, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, and AC2600 before 1.2.0.62."
},
{
"lang": "es",
"value": "Determinados dispositivos NETGEAR est\u00e1n afectados por un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria por parte de un atacante no autenticado. Esto afecta a R6260 versiones anteriores a 1.1.0.76, a R6800 versiones anteriores a 1.2.0.62, a R6700v2 versiones anteriores a 1.2.0.62, a R6900v2 versiones anteriores a 1.2.0.62, a R7450 versiones anteriores a 1.2.0.62, al AC2100 versiones anteriores a 1.2.0.62, al AC2400 versiones anteriores a 1.2.0.62 y al AC2600 versiones anteriores a 1.2.0.62"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.0.76",
"matchCriteriaId": "23D4F7E6-C042-434E-87B8-55DB18B08B0A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C395D49-57F9-4BC1-8619-57127355B86B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0.62",
"matchCriteriaId": "812D595B-5EDD-443F-8169-EF802C44DE2C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09404083-B00B-4C1F-8085-BC242E625CA3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0.62",
"matchCriteriaId": "1A3E4091-5CDD-4C35-84B9-C4BAF2B8FA4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9793286-86D2-43BF-B9B8-823C05BCAE4B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0.62",
"matchCriteriaId": "FF0079DC-7F71-4B0D-B9A9-3193F88723C0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9FC6398-60A5-4003-A294-C96AE6DBCED5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0.62",
"matchCriteriaId": "C2428BDA-BF24-4CB7-8534-C7ADF96EF3DC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA5420D-DD64-4A9C-9B5F-784F0ED2B464"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0.62",
"matchCriteriaId": "25314438-D37F-4A87-953A-4661172C75E8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A80B06A1-81B5-4C33-89F6-EC3F6E3068B5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0.62",
"matchCriteriaId": "1181818D-D6E2-416E-A7B0-06259230F1A1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B25A18F-DD96-45FE-B098-71E60CB0FFFE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.0.62",
"matchCriteriaId": "26B17DB2-91A0-4B9D-9A6A-608A3955184E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BFCD9A8-1846-48C4-9F14-3866E983FB74"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000064059/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Some-Routers-PSV-2019-0081",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}