Vulnerabilites related to netgear - mk63_firmware
cve-2020-14429
Vulnerability from cvelistv5
Published
2020-06-18 16:25
Modified
2024-08-04 12:46
Severity ?
EPSS score ?
Summary
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects MK62 before 1.0.4.92, MK63 before 1.0.4.92, MR60 before 1.0.4.92, MS60 before 1.0.4.92, RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBS750 before 3.2.15.25, RBR750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:46:34.531Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects MK62 before 1.0.4.92, MK63 before 1.0.4.92, MR60 before 1.0.4.92, MS60 before 1.0.4.92, RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBS750 before 3.2.15.25, RBR750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "LOW", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AC:L/AV:A/A:L/C:H/I:H/PR:N/S:C/UI:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-06-18T16:25:30", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-14429", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects MK62 before 1.0.4.92, MK63 before 1.0.4.92, MR60 before 1.0.4.92, MS60 before 1.0.4.92, RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBS750 before 3.2.15.25, RBR750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "ADJACENT", availabilityImpact: "LOW", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AC:L/AV:A/A:L/C:H/I:H/PR:N/S:C/UI:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050", refsource: "CONFIRM", url: "https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-14429", datePublished: "2020-06-18T16:25:30", dateReserved: "2020-06-18T00:00:00", dateUpdated: "2024-08-04T12:46:34.531Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2020-06-18 17:15
Modified
2024-11-21 05:03
Severity ?
Summary
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects MK62 before 1.0.4.92, MK63 before 1.0.4.92, MR60 before 1.0.4.92, MS60 before 1.0.4.92, RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBS750 before 3.2.15.25, RBR750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netgear | mk62_firmware | * | |
netgear | mk62 | - | |
netgear | mk63_firmware | * | |
netgear | mk63 | - | |
netgear | mr60_firmware | * | |
netgear | mr60 | - | |
netgear | ms60_firmware | * | |
netgear | ms60 | - | |
netgear | rbk752_firmware | * | |
netgear | rbk752 | - | |
netgear | rbk753_firmware | * | |
netgear | rbk753 | - | |
netgear | rbk753s_firmware | * | |
netgear | rbk753s | - | |
netgear | rbs750_firmware | * | |
netgear | rbs750 | - | |
netgear | rbr750_firmware | * | |
netgear | rbr750 | - | |
netgear | rbk842_firmware | * | |
netgear | rbk842 | - | |
netgear | rbr840_firmware | * | |
netgear | rbr840 | - | |
netgear | rbs840_firmware | * | |
netgear | rbs840 | - | |
netgear | rbk852_firmware | * | |
netgear | rbk852 | - | |
netgear | rbk853_firmware | * | |
netgear | rbk853 | - | |
netgear | rbr850_firmware | * | |
netgear | rbr850 | - | |
netgear | rbs850_firmware | * | |
netgear | rbs850 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C17F8372-6149-455C-B48F-4BE45DC92EC7", versionEndExcluding: "1.0.4.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*", matchCriteriaId: "69A79475-37BE-47BD-A629-DCEF22500B0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:mk63_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08087535-0C20-4FB8-9F73-CD4817343459", versionEndExcluding: "1.0.4.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:mk63:-:*:*:*:*:*:*:*", matchCriteriaId: "3DFA7D26-4286-40B2-94CB-0D2A6E6FCF1C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9584E85F-AD4C-46A2-A96A-0FE52E0B4FE9", versionEndExcluding: "1.0.4.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", matchCriteriaId: "65BB3ECD-2F0B-4625-A1DB-F6CEFC46E277", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63495F09-8D4B-4BAC-96C0-3A15D9019C14", versionEndExcluding: "1.0.4.92", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", matchCriteriaId: "F003F064-591C-4D7C-9EC4-D0E553BC6683", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE271234-71E6-4F3A-8F39-DA86D1275331", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", matchCriteriaId: "A45832BD-114D-42F1-B9F1-7532496D30A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk753_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "436BED04-0FD2-499B-9D42-F9E0AAA6CB97", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk753:-:*:*:*:*:*:*:*", matchCriteriaId: "56AE9F2F-50F1-4917-BB21-FAEE6AACB14E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk753s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F35DDDEC-A64B-400E-ABF8-E13F432BD261", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk753s:-:*:*:*:*:*:*:*", matchCriteriaId: "192647CA-5BFC-4021-A91D-7CB8761FA137", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F60A549C-0D76-4A83-BBCD-C1D04075809B", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", matchCriteriaId: "B529194C-C440-4BC3-850F-0613FC548F86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "905C4D26-8575-429C-B1D2-FC35C773B129", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", matchCriteriaId: "C13F5C69-FA9B-472A-9036-0C2967BDCDE9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk842_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "754ACE12-E256-4B21-ABD5-CB5F3DA4BDC7", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk842:-:*:*:*:*:*:*:*", matchCriteriaId: "0E9B19B2-5FF1-4C85-8504-C33C34F072B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr840_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D19A1E4D-30F2-4263-B4BE-273EED14702E", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr840:-:*:*:*:*:*:*:*", matchCriteriaId: "4489CB05-A1C0-408C-8D8C-56EE98CA20E8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs840_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "44ED0285-F862-44B9-B0EE-C2FDC42706A2", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs840:-:*:*:*:*:*:*:*", matchCriteriaId: "84AEA27B-8BEA-4E83-819A-FDAC1881928F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7300226F-8997-4142-8DAC-682F0E313072", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", matchCriteriaId: "14F257FE-31CE-4F74-829D-29407D74ADF7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbk853_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A553C5A2-EB80-4314-A623-8F489A4E74E2", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbk853:-:*:*:*:*:*:*:*", matchCriteriaId: "4479CEAD-3B87-4993-80C8-1AE59242CFA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86A9DFB9-8429-45DB-84E8-30F37535145E", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", matchCriteriaId: "D92E4C8E-222A-476C-8273-F7171FC61F0B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4FC4E2F-711C-432A-91FE-27CB1EE41A33", versionEndExcluding: "3.2.15.25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", matchCriteriaId: "221CA950-E984-44CD-9E1B-3AADE3CEBE52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects MK62 before 1.0.4.92, MK63 before 1.0.4.92, MR60 before 1.0.4.92, MS60 before 1.0.4.92, RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBS750 before 3.2.15.25, RBR750 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, RBS840 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.", }, { lang: "es", value: "Determinados dispositivos NETGEAR están afectados por una divulgación de credenciales administrativas. Esto afecta a MK62 versiones anteriores a 1.0.4.92, MK63 versiones anteriores a 1.0.4.92, MR60 versiones anteriores a 1.0.4.92, MS60 versiones anteriores a 1.0.4.92, RBK752 versiones anteriores a 3.2.15.25, RBK753 versiones anteriores a 3.2.15.25, RBK753S versiones anteriores a 3.2.15.25, RBS750 versiones anteriores a 3.2.15.25, RBR750 versiones anteriores a 3.2.15.25, RBK842 versiones anteriores a 3.2.15.25, RBR840 versiones anteriores a 3.2.15.25, RBS840 versiones anteriores a 3.2.15.25, RBK852 versiones anteriores a 3.2.15.25, RBK853 versiones anteriores a 3.2.15.25, RBR850 versiones anteriores a 3.2.15.25 y RBS850 versiones anteriores a 3.2.15.25", }, ], id: "CVE-2020-14429", lastModified: "2024-11-21T05:03:14.980", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "LOW", baseScore: 9.6, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 6, source: "cve@mitre.org", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-06-18T17:15:12.077", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://kb.netgear.com/000061938/Security-Advisory-for-Admin-Credential-Disclosure-on-Some-WiFi-Systems-PSV-2020-0050", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }