Lucene search

K
cve[email protected]CVE-2018-21156
HistoryApr 27, 2020 - 6:15 p.m.

CVE-2018-21156

2020-04-2718:15:12
CWE-120
web.nvd.nist.gov
18
netgear
buffer overflow
cve-2018-21156
security
vulnerability
nvd

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

40.5%

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.38, D6400 before 1.0.0.74, D7000v2 before 1.0.0.74, D8500 before 1.0.3.39, DGN2200v4 before 1.0.0.102, DGN2200Bv4 before 1.0.0.102, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, EX6000 before 1.0.0.30, EX6100 before 1.0.2.22, EX6120 before 1.0.0.40, EX6130 before 1.0.0.22, EX6150 before 1.0.0.38, EX6200 before 1.0.3.86, EX7000 before 1.0.0.64, R6250 before 1.0.4.20, R6300v2 before 1.0.4.22, R6400 before 1.0.1.32, R6400v2 before 1.0.2.52, R6700 before 1.0.1.44, R6900 before 1.0.1.44, R6900P before 1.3.0.18, R7000 before 1.0.9.28, R7000P before 1.3.0.18, R7300DST before 1.0.0.62, R7900 before 1.0.2.10, R7900P before 1.3.0.10, R8000 before 1.0.4.12, R8000P before 1.3.0.10, R8300 before 1.0.2.116, R8500 before 1.0.2.116, WN2500RPv2 before 1.0.1.52, WNDR3400v3 before 1.0.1.18, and WNR3500Lv2 before 1.2.0.46.

Affected configurations

NVD
Node
netgeard6220_firmwareRange<1.0.0.38
AND
netgeard6220Match-
Node
netgeard6400_firmwareRange<1.0.0.74
AND
netgeard6400Match-
Node
netgeard7000_firmwareRange<1.0.0.74
AND
netgeard7000Matchv2
Node
netgeard8500_firmwareRange<1.0.3.39
AND
netgeard8500Match-
Node
netgeardgn2200_firmwareRange<1.0.0.102
AND
netgeardgn2200Matchv4
Node
netgeardgn2200b_firmwareRange<1.0.0.102
AND
netgeardgn2200bMatchv4
Node
netgearex3700_firmwareRange<1.0.0.70
AND
netgearex3700Match-
Node
netgearex3800_firmwareRange<1.0.0.70
AND
netgearex3800Match-
Node
netgearex6000_firmwareRange<1.0.0.30
AND
netgearex6000Match-
Node
netgearex6100_firmwareRange<1.0.2.22
AND
netgearex6100Match-
Node
netgearex6120_firmwareRange<1.0.0.40
AND
netgearex6120Match-
Node
netgearex6130_firmwareRange<1.0.0.22
AND
netgearex6130Match-
Node
netgearex6150_firmwareRange<1.0.0.38
AND
netgearex6150Match-
Node
netgearex6200_firmwareRange<1.0.3.86
AND
netgearex6200Match-
Node
netgearex7000_firmwareRange<1.0.0.64
AND
netgearex7000Match-
Node
netgearr6250_firmwareRange<1.0.4.20
AND
netgearr6250Match-
Node
netgearr6300_firmwareRange<1.0.4.22
AND
netgearr6300Matchv2
Node
netgearr6400_firmwareRange<1.0.1.32
AND
netgearr6400Match-
Node
netgearr6400_firmwareRange<1.0.2.52
AND
netgearr6400Matchv2
Node
netgearr6700_firmwareRange<1.0.1.44
AND
netgearr6700Match-
Node
netgearr6900_firmwareRange<1.0.1.44
AND
netgearr6900Match-
Node
netgearr6900p_firmwareRange<1.3.0.18
AND
netgearr6900pMatch-
Node
netgearr7000_firmwareRange<1.0.9.28
AND
netgearr7000Match-
Node
netgearr7000p_firmwareRange<1.3.0.18
AND
netgearr7000pMatch-
Node
netgearr7300dst_firmwareRange<1.0.0.62
AND
netgearr7300dstMatch-
Node
netgearr7900_firmwareRange<1.0.2.10
AND
netgearr7900Match-
Node
netgearr7900p_firmwareRange<1.3.0.10
AND
netgearr7900pMatch-
Node
netgearr8000_firmwareRange<1.0.4.12
AND
netgearr8000Match-
Node
netgearr8000p_firmwareRange<1.3.0.10
AND
netgearr8000pMatch-
Node
netgearr8300_firmwareRange<1.0.2.116
AND
netgearr8300Match-
Node
netgearr8500_firmwareRange<1.0.2.116
AND
netgearr8500Match-
Node
netgearwn2500rp_firmwareRange<1.0.1.52
AND
netgearwn2500rpMatchv2
Node
netgearwndr3400_firmwareRange<1.0.1.18
AND
netgearwndr3400Matchv3
Node
netgearwnr3500l_firmwareRange<1.2.0.46
AND
netgearwnr3500lMatchv2

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

40.5%

Related for CVE-2018-21156