Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2021-55 | Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-55 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2021-55 - Third Party Advisory |
Information
Published : 2021-12-30 22:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20171
Mitre link : CVE-2021-20171
CVE.ORG link : CVE-2021-20171
JSON object : View
Products Affected
netgear
- rax43_firmware
- rax43
CWE
CWE-312
Cleartext Storage of Sensitive Information