CVE-2021-20171

Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:rax43_firmware:1.0.3.96:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:46

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2021-55 - Third Party Advisory () https://www.tenable.com/security/research/tra-2021-55 - Third Party Advisory

Information

Published : 2021-12-30 22:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20171

Mitre link : CVE-2021-20171

CVE.ORG link : CVE-2021-20171


JSON object : View

Products Affected

netgear

  • rax43_firmware
  • rax43
CWE
CWE-312

Cleartext Storage of Sensitive Information