{"id": "CVE-2021-45606", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}, {"type": "Secondary", "source": "cve@mitre.org", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.5, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 0.9}]}, "published": "2021-12-26T01:15:17.993", "references": [{"url": "https://kb.netgear.com/000064498/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-PSV-2020-0499", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-787"}]}], "descriptions": [{"lang": "en", "value": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6400 before 1.0.1.70, R7000 before 1.0.11.126, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RS400 before 1.5.1.80, R6400v2 before 1.0.4.118, R7000P before 1.3.3.140, RAX80 before 1.0.4.120, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, and RAX75 before 1.0.4.120."}, {"lang": "es", "value": "Determinados dispositivos NETGEAR est\u00e1n afectados por un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria por parte de un usuario autenticado. Esto afecta a R6400 versiones anteriores a 1.0.1.70, a R7000 versiones anteriores a 1.0.11.126, a R7900 versiones anteriores a 1.0.4.46, a R7900P versiones anteriores a 1.4.2.84, a R7960P versiones anteriores a 1.4.2.84, a R8000 versiones anteriores a 1.0.4.74, a R8000P versiones anteriores a 1.4.2.84, a RAX200 versiones anteriores a 1. 0.4.120, RS400 versiones anteriores a 1.5.1.80, R6400v2 versiones anteriores a 1.0.4.118, R7000P versiones anteriores a 1.3.3.140, RAX80 versiones anteriores a 1.0.4.120, R6700v3 versiones anteriores a 1.0.4.118, R6900P versiones anteriores a 1.3.3.140 y RAX75 versiones anteriores a 1.0.4.120"}], "lastModified": "2022-01-07T19:21:54.667", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA1BB56F-20B5-4A79-AE9D-429A011EAA4C", "versionEndExcluding": "1.0.1.70"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3E4CDF6B-3829-44D0-9675-71D7BE83CAA2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0E06EFF-9D71-43DB-A304-9A41998FD68A", "versionEndExcluding": "1.0.11.126"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C9F86FF6-AB32-4E51-856A-DDE790C0A9A6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4195BC65-A849-4C3A-B726-E013CEB57F32", "versionEndExcluding": "1.0.4.46"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C484840F-AF30-4B5C-821A-4DB9BE407BDB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA344C08-94F1-47F8-9607-3D854B890E19", "versionEndExcluding": "1.4.2.84"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F3D6A70D-66AF-4064-9F1B-4358D4B1F016"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33B2293C-09AD-4B5A-B2A0-923E2B9923AA", "versionEndExcluding": "1.4.2.84"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "091CEDB5-0069-4253-86D8-B9FE17CB9F24"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A662FDCF-DC41-4DC9-B77E-BE1D636AC0B3", "versionEndExcluding": "1.0.4.74"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5B39F095-8FE8-43FD-A866-7B613B495984"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4905D866-2326-487F-AAA5-96ABA0DBD56E", "versionEndExcluding": "1.4.2.84"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F7EF872D-2537-4FEB-8799-499FC9D44339"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3A7E8BF-8CC3-4806-89F5-FBE01A36A1FD", "versionEndExcluding": "1.3.3.140"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DFE55F4D-E98B-46D3-B870-041141934CD1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94795476-184B-4E7D-9D8B-ECB45609108E", "versionEndExcluding": "1.3.3.140"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C41908FF-AE64-4949-80E3-BEE061B2DA8A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0702F9B6-2DAC-4308-8737-9F85AD28E847", "versionEndExcluding": "1.0.4.118"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C88DA385-5FAE-49EC-80D6-78F81E7EEC16"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0095B9D4-E161-4050-B283-2166CB86CB24", "versionEndExcluding": "1.0.4.118"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AFE6B3A8-0601-44EA-AD9B-3BDDE6654FDF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6334DE4D-E78B-4582-9C6F-6123DA5192C7", "versionEndExcluding": "1.0.4.120"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "58EB0F2F-FB5C-47D9-9AE6-087AE517B3F9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "334BB384-5C29-4D24-9F82-B8EE8D0CA8BF", "versionEndExcluding": "1.0.4.120"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "06B5A85C-3588-4263-B9AD-4E56D3F6CB16"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDF9F3BA-4239-4F4D-A65E-A6752A5420F6", "versionEndExcluding": "1.0.4.120"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1BAA74D7-36A1-4494-96A2-BD0D2D6BF22F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95AF0FA9-F2C5-4D84-BF37-AA8CB6EC3C4A", "versionEndExcluding": "1.5.1.80"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2700644E-0940-4D05-B3CA-904D91739E58"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}