Lucene search

K
cveMitreCVE-2021-38525
HistoryAug 11, 2021 - 12:16 a.m.

CVE-2021-38525

2021-08-1100:16:09
CWE-787
mitre
web.nvd.nist.gov
54
netgear
devices
stack-based buffer overflow
cve-2021-38525
security
vulnerability
nvd

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

40.5%

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40.

Affected configurations

Nvd
Node
netgeard3600_firmwareRange<1.0.0.76
AND
netgeard3600Match-
Node
netgeard6000_firmwareRange<1.0.0.76
AND
netgeard6000Match-
Node
netgeard6200_firmwareRange<1.1.00.36
AND
netgeard6200Match-
Node
netgeard7000_firmwareRange<1.0.1.70
AND
netgeard7000Match-
Node
netgearex6200_firmwareRange<1.0.1.78
AND
netgearex6200Matchv2
Node
netgearex7000_firmwareRange<1.0.1.78
AND
netgearex7000Match-
Node
netgearex8000_firmwareRange<1.0.1.186
AND
netgearex8000Match-
Node
netgearjr6150_firmwareRange<1.0.1.18
AND
netgearjr6150Match-
Node
netgearpr2000_firmwareRange<1.0.0.28
AND
netgearpr2000Match-
Node
netgearr6020_firmwareRange<1.0.0.42
AND
netgearr6020Match-
Node
netgearr6050_firmwareRange<1.0.1.18
AND
netgearr6050Match-
Node
netgearr6080_firmwareRange<1.0.0.42
AND
netgearr6080Match-
Node
netgearr6120_firmwareRange<1.0.0.46
AND
netgearr6120Match-
Node
netgearr6220_firmwareRange<1.1.0.80
AND
netgearr6220Match-
Node
netgearr6260_firmwareRange<1.1.0.64
AND
netgearr6260Match-
Node
netgearr6300_firmwareRange<1.0.4.34
AND
netgearr6300Matchv2
Node
netgearr6700_firmwareRange<1.0.2.6
AND
netgearr6700Match-
Node
netgearr6700_firmwareRange<1.2.0.36
AND
netgearr6700Matchv2
Node
netgearr6800_firmwareRange<1.2.0.36
AND
netgearr6800Match-
Node
netgearr6900_firmwareRange<1.0.2.4
AND
netgearr6900Match-
Node
netgearr6900p_firmwareRange<1.3.1.64
AND
netgearr6900pMatch-
Node
netgearr6900_firmwareRange<1.2.0.36
AND
netgearr6900Matchv2
Node
netgearr7000_firmwareRange<1.0.9.42
AND
netgearr7000Match-
Node
netgearr7000p_firmwareRange<1.3.1.64
AND
netgearr7000pMatch-
Node
netgearr7800_firmwareRange<1.0.2.60
AND
netgearr7800Match-
Node
netgearr8900_firmwareRange<1.0.4.12
AND
netgearr8900Match-
Node
netgearr9000_firmwareRange<1.0.4.12
AND
netgearr9000Match-
Node
netgearxr500_firmwareRange<2.3.2.40
AND
netgearxr500Match-
VendorProductVersionCPE
netgeard3600_firmware*cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*
netgeard3600-cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*
netgeard6000_firmware*cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*
netgeard6000-cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*
netgeard6200_firmware*cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*
netgeard6200-cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*
netgeard7000_firmware*cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*
netgeard7000-cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*
netgearex6200_firmware*cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*
netgearex6200v2cpe:2.3:h:netgear:ex6200:v2:*:*:*:*:*:*:*
Rows per page:
1-10 of 541

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

40.5%

Related for CVE-2021-38525