ID CVE-2018-21174
Type cve
Reporter cve@mitre.org
Modified 2020-05-05T18:27:00
Description
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R7500 before 1.0.0.122, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
{"id": "CVE-2018-21174", "bulletinFamily": "NVD", "title": "CVE-2018-21174", "description": "Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R7500 before 1.0.0.122, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.", "published": "2020-04-27T19:15:00", "modified": "2020-05-05T18:27:00", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-21174", "reporter": "cve@mitre.org", "references": ["https://kb.netgear.com/000055184/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2625"], "cvelist": ["CVE-2018-21174"], "type": "cve", "lastseen": "2020-12-09T20:25:41", "edition": 8, "viewCount": 16, "enchantments": {"dependencies": {"references": [], "modified": "2020-12-09T20:25:41", "rev": 2}, "score": {"value": 4.4, "vector": "NONE", "modified": "2020-12-09T20:25:41", "rev": 2}, "vulnersScore": 4.4}, "cpe": [], "affectedSoftware": [{"cpeName": "netgear:wndr4300_firmware", "name": "netgear wndr4300 firmware", "operator": "lt", "version": "1.0.0.50"}, {"cpeName": "netgear:wndr4500_firmware", "name": "netgear wndr4500 firmware", "operator": "lt", "version": "1.0.0.50"}, {"cpeName": "netgear:wndr3700_firmware", "name": "netgear wndr3700 firmware", "operator": "lt", "version": "1.0.2.92"}, {"cpeName": "netgear:r7500_firmware", "name": "netgear r7500 firmware", "operator": "lt", "version": "1.0.0.122"}, {"cpeName": "netgear:r7800_firmware", "name": "netgear r7800 firmware", "operator": "lt", "version": "1.0.2.40"}, {"cpeName": "netgear:d6100_firmware", "name": "netgear d6100 firmware", "operator": "lt", "version": "1.0.0.57"}, {"cpeName": "netgear:r9000_firmware", "name": "netgear r9000 firmware", "operator": "lt", "version": "1.0.2.52"}, {"cpeName": "netgear:wnr2000_firmware", "name": "netgear wnr2000 firmware", "operator": "lt", "version": "1.0.0.62"}, {"cpeName": "netgear:wndr4300_firmware", "name": "netgear wndr4300 firmware", "operator": "lt", "version": "1.0.2.94"}], "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, "cpe23": [], "cwe": ["CWE-787"], "scheme": null, "affectedConfiguration": [{"cpeName": "netgear:wndr3700", "name": "netgear wndr3700", "operator": "eq", "version": "v4"}, {"cpeName": "netgear:wnr2000", "name": "netgear wnr2000", "operator": "eq", "version": "v5"}, {"cpeName": "netgear:r7800", "name": "netgear r7800", "operator": "eq", "version": "-"}, {"cpeName": "netgear:d6100", "name": "netgear d6100", "operator": "eq", "version": "-"}, {"cpeName": "netgear:wndr4500", "name": "netgear wndr4500", "operator": "eq", "version": "v3"}, {"cpeName": "netgear:r7500", "name": "netgear r7500", "operator": "eq", "version": "-"}, {"cpeName": "netgear:wndr4300", "name": "netgear wndr4300", "operator": "eq", "version": "-"}, {"cpeName": "netgear:r9000", "name": "netgear r9000", "operator": "eq", "version": "-"}, {"cpeName": "netgear:wndr4300", "name": "netgear wndr4300", "operator": "eq", "version": "v2"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:wndr4500_firmware:1.0.0.50:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.0.50", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:wndr4300_firmware:1.0.2.94:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.2.94", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:wndr3700_firmware:1.0.2.92:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.2.92", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:wnr2000_firmware:1.0.0.62:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.0.62", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:r9000_firmware:1.0.2.52:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.2.52", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:wndr4300_firmware:1.0.0.50:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.0.50", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:r7500_firmware:1.0.0.122:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.0.122", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:d6100_firmware:1.0.0.57:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.0.57", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:r7800_firmware:1.0.2.40:*:*:*:*:*:*:*", "versionEndExcluding": "1.0.2.40", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}]}}
{}