ID CVE-2019-20671
Type cve
Reporter cve@mitre.org
Modified 2020-04-20T15:50:00
Description
Certain NETGEAR devices are affected by stored XSS. This affects RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
{"id": "CVE-2019-20671", "bulletinFamily": "NVD", "title": "CVE-2019-20671", "description": "Certain NETGEAR devices are affected by stored XSS. This affects RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK20 before 2.3.5.26, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK40 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.", "published": "2020-04-15T20:15:00", "modified": "2020-04-20T15:50:00", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20671", "reporter": "cve@mitre.org", "references": ["https://kb.netgear.com/000061468/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-WiFi-Systems-PSV-2018-0548"], "cvelist": ["CVE-2019-20671"], "type": "cve", "lastseen": "2020-12-09T21:41:50", "edition": 11, "viewCount": 6, "enchantments": {"dependencies": {"references": [], "modified": "2020-12-09T21:41:50", "rev": 2}, "score": {"value": 3.3, "vector": "NONE", "modified": "2020-12-09T21:41:50", "rev": 2}, "vulnersScore": 3.3}, "cpe": [], "affectedSoftware": [{"cpeName": "netgear:rbr50_firmware", "name": "netgear rbr50 firmware", "operator": "lt", "version": "2.3.5.30"}, {"cpeName": "netgear:rbr20_firmware", "name": "netgear rbr20 firmware", "operator": "lt", "version": "2.3.5.26"}, {"cpeName": "netgear:rbr40_firmware", "name": "netgear rbr40 firmware", "operator": "lt", "version": "2.3.5.30"}, {"cpeName": "netgear:rbk40_firmware", "name": "netgear rbk40 firmware", "operator": "lt", "version": "2.3.5.30"}, {"cpeName": "netgear:rbs20_firmware", "name": "netgear rbs20 firmware", "operator": "lt", "version": "2.3.5.26"}, {"cpeName": "netgear:rbk20_firmware", "name": "netgear rbk20 firmware", "operator": "lt", "version": "2.3.5.26"}, {"cpeName": "netgear:rbs50_firmware", "name": "netgear rbs50 firmware", "operator": "lt", "version": "2.3.5.30"}, {"cpeName": "netgear:rbk50_firmware", "name": "netgear rbk50 firmware", "operator": "lt", "version": "2.3.5.30"}, {"cpeName": "netgear:rbs40_firmware", "name": "netgear rbs40 firmware", "operator": "lt", "version": "2.3.5.30"}], "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 1.7, "impactScore": 2.7}, "cpe23": [], "cwe": ["CWE-79"], "scheme": null, "affectedConfiguration": [{"cpeName": "netgear:rbr20", "name": "netgear rbr20", "operator": "eq", "version": "-"}, {"cpeName": "netgear:rbk40", "name": "netgear rbk40", "operator": "eq", "version": "-"}, {"cpeName": "netgear:rbs20", "name": "netgear rbs20", "operator": "eq", "version": "-"}, {"cpeName": "netgear:rbs40", "name": "netgear rbs40", "operator": "eq", "version": "-"}, {"cpeName": "netgear:rbs50", "name": "netgear rbs50", "operator": "eq", "version": "-"}, {"cpeName": "netgear:rbk50", "name": "netgear rbk50", "operator": "eq", "version": "-"}, {"cpeName": "netgear:rbk20", "name": "netgear rbk20", "operator": "eq", "version": "-"}, {"cpeName": "netgear:rbr50", "name": "netgear rbr50", "operator": "eq", "version": "-"}, {"cpeName": "netgear:rbr40", "name": "netgear rbr40", "operator": "eq", "version": "-"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbk50_firmware:2.3.5.30:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.30", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbs50_firmware:2.3.5.30:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.30", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbr20_firmware:2.3.5.26:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.26", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbr40_firmware:2.3.5.30:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.30", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbk40_firmware:2.3.5.30:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.30", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbs40_firmware:2.3.5.30:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.30", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbk20_firmware:2.3.5.26:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.26", "vulnerable": true}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbr50_firmware:2.3.5.30:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.30", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:netgear:rbs20_firmware:2.3.5.26:*:*:*:*:*:*:*", "versionEndExcluding": "2.3.5.26", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}]}}
{}