Lucene search

K
cveTenableCVE-2021-20156
HistoryDec 30, 2021 - 10:15 p.m.

CVE-2021-20156

2021-12-3022:15:08
CWE-347
tenable
web.nvd.nist.gov
28
cve-2021-20156
trendnet
ac2600
tew-827dru
firmware update
access control
malicious
signature validation
update server

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

22.7%

Trendnet AC2600 TEW-827DRU version 2.08B01 contains an improper access control configuration that could allow for a malicious firmware update. It is possible to manually install firmware that may be malicious in nature as there does not appear to be any signature validation done to determine if it is from a known and trusted source. This includes firmware updates that are done via the automated “check for updates” in the admin interface. If an attacker is able to masquerade as the update server, the device will not verify that the firmware updates downloaded are legitimate.

Affected configurations

Nvd
Node
trendnettew-827dru_firmwareMatch2.08b01
AND
trendnettew-827druMatch2.0
VendorProductVersionCPE
trendnettew-827dru_firmware2.08b01cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*
trendnettew-827dru2.0cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Trendnet AC2600 TEW-827DRU",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "2.08B01"
      }
    ]
  }
]

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

22.7%

Related for CVE-2021-20156