CVE-2019-20676 (GCVE-0-2019-20676)
Vulnerability from cvelistv5 – Published: 2020-04-15 19:14 – Updated: 2024-08-05 02:46
VLAI?
Summary
Certain NETGEAR devices are affected by lack of access control at the function level. This affects FS728TLP before 1.0.1.26, GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS108Ev3 before 2.06.08, GS108PEv3 before 2.06.08, GS110EMX before 1.0.1.4, GS116Ev2 before 2.6.0.35, GS408EPP before 1.0.0.15, GS724TPv2 before 1.1.1.29, GS808E before 1.7.0.7, GS810EMX before 1.7.1.1, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15, GSS116E before 1.6.0.9, JGS516PE before 2.6.0.35, JGS524Ev2 before 2.6.0.35, JGS524PE before 2.6.0.35, XS512EM before 1.0.1.1, XS708Ev2 before 1.6.0.23, XS716E before 1.6.0.23, and XS724EM before 1.0.1.1.
Severity ?
6 (Medium)
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T02:46:10.323Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain NETGEAR devices are affected by lack of access control at the function level. This affects FS728TLP before 1.0.1.26, GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS108Ev3 before 2.06.08, GS108PEv3 before 2.06.08, GS110EMX before 1.0.1.4, GS116Ev2 before 2.6.0.35, GS408EPP before 1.0.0.15, GS724TPv2 before 1.1.1.29, GS808E before 1.7.0.7, GS810EMX before 1.7.1.1, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15, GSS116E before 1.6.0.9, JGS516PE before 2.6.0.35, JGS524Ev2 before 2.6.0.35, JGS524PE before 2.6.0.35, XS512EM before 1.0.1.1, XS708Ev2 before 1.6.0.23, XS716E before 1.6.0.23, and XS724EM before 1.0.1.1."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:L/A:N/C:H/I:H/PR:H/S:U/UI:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-04-15T19:14:05",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-20676",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain NETGEAR devices are affected by lack of access control at the function level. This affects FS728TLP before 1.0.1.26, GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS108Ev3 before 2.06.08, GS108PEv3 before 2.06.08, GS110EMX before 1.0.1.4, GS116Ev2 before 2.6.0.35, GS408EPP before 1.0.0.15, GS724TPv2 before 1.1.1.29, GS808E before 1.7.0.7, GS810EMX before 1.7.1.1, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15, GSS116E before 1.6.0.9, JGS516PE before 2.6.0.35, JGS524Ev2 before 2.6.0.35, JGS524PE before 2.6.0.35, XS512EM before 1.0.1.1, XS708Ev2 before 1.6.0.23, XS716E before 1.6.0.23, and XS724EM before 1.0.1.1."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AC:L/AV:L/A:N/C:H/I:H/PR:H/S:U/UI:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542",
"refsource": "CONFIRM",
"url": "https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-20676",
"datePublished": "2020-04-15T19:14:05",
"dateReserved": "2020-04-15T00:00:00",
"dateUpdated": "2024-08-05T02:46:10.323Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:fs728tlp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.26\", \"matchCriteriaId\": \"5A5F92D9-065E-40AA-BDBA-73E2671C961A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:fs728tlp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4EEBDAE-AE10-43F2-BB8A-73CE293848D9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs105e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.6.0.4\", \"matchCriteriaId\": \"FBF196D1-A0B3-443D-88A0-AA2E096C57F6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs105e:v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD993BAB-DF89-41AB-936B-9C6F280BAE1D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs105pe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.6.0.4\", \"matchCriteriaId\": \"F0E0CE18-6EA8-41F5-8984-1FEB91561127\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs105pe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"211D1DBE-5D7A-4309-A125-126AF2A16647\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs108e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.06.08\", \"matchCriteriaId\": \"DDE4B26A-8305-40B9-8A70-59626881EEEA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs108e:v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5579C6E3-866F-4E6A-BD4C-0A1239DE5699\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs108pe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.06.08\", \"matchCriteriaId\": \"114E9F01-DD89-488E-9D95-33C420AEC7CD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs108pe:v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DA97C4B-C592-4418-8F3B-24C891D3C830\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs110emx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.4\", \"matchCriteriaId\": \"D83E3054-7E97-49C1-B694-B0118200ACEC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs110emx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E1EEC50-F8C6-4B34-AB0A-EC5466FF7A74\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs116e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.6.0.35\", \"matchCriteriaId\": \"8377DD76-5028-4BB1-B670-453ECCB9BE2E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs116e:v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DA5EF92-9B28-4C81-8A95-C5BCEC19591A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs408epp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.15\", \"matchCriteriaId\": \"A902F828-C55A-45B9-81D5-641FFE0ACD2D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs408epp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E8C803-F6E4-4CFD-B9BA-D83A7C5269E9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.1.1.29\", \"matchCriteriaId\": \"0515B176-5785-4ABB-BE14-7E2B1766325A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E871CCB4-8093-44AE-B289-CF81F82A9DB8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs808e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.7.0.7\", \"matchCriteriaId\": \"D0DC63B1-22DB-4509-A468-9D1B63C997E7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs808e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FBE41AE-2001-4539-9F63-710EDEE42629\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs810emx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.7.1.1\", \"matchCriteriaId\": \"A8E8C971-788E-4D6D-B8BB-B65B2813EE5C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs810emx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91F71973-C209-4401-B887-9399F9552D7D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gs908e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.7.0.3\", \"matchCriteriaId\": \"7D4E120D-3609-40F0-86B3-E7A2BC774D40\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gs908e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6CA61D2-1B85-4C5F-86CA-AB1F877243FA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gss108e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.6.0.4\", \"matchCriteriaId\": \"3350D6E6-522C-4D9F-9D74-EE3A2FB9177E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gss108e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8244C4BA-F166-4C32-BF43-0964CD99921B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gss108epp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.15\", \"matchCriteriaId\": \"E2106BBF-F216-4CBE-915C-B9680BB8B4EC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gss108epp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EF32417-92E9-4D8B-913A-539A473A2673\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:gss116e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.6.0.9\", \"matchCriteriaId\": \"5987DE76-B142-43AD-A06A-EED97FBEDC25\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:gss116e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C7E2A39-F250-49EB-AE39-A1745B8F1569\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.6.0.35\", \"matchCriteriaId\": \"7C97166D-7ED9-477D-A246-113BAFFED0C5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:jgs516pe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCBC0DAB-226E-4C95-9818-7758D37EFD10\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:jgs524e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.6.0.35\", \"matchCriteriaId\": \"573A1DF4-2441-4B8C-9A01-6CC6BAF2B48E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:jgs524e:v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFF899BD-AA1E-4C47-BCFD-5E32F75F538A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:jgs524pe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.6.0.35\", \"matchCriteriaId\": \"32DC5F31-3757-4739-8A10-F44DA2637080\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:jgs524pe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4A32288-19B5-4A8F-B883-FCC326B7032D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:xs512em_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.1\", \"matchCriteriaId\": \"A39A00BE-2EAA-4893-AE8C-EB5B15C1E8DC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:xs512em:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48FCC8F7-1043-4069-924D-0124FE5D10B0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:xs708e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.6.0.23\", \"matchCriteriaId\": \"43A13AEB-F9FC-4F7D-812E-F28CE368F9E8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:xs708e:v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD93BF51-A52C-422F-BB05-63CF9E97D3B7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:xs716e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.6.0.23\", \"matchCriteriaId\": \"3F96E693-D402-4ECB-B2E1-28A06810B9F4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:xs716e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C6BBBDF-8E4C-42B3-9B23-C0970F5C4B7B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:xs724em_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.1\", \"matchCriteriaId\": \"6C642EB2-F5F9-43B9-8F14-EF70F2429A46\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:xs724em:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30918F59-D8C5-4A49-A10D-A5703261CCE1\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Certain NETGEAR devices are affected by lack of access control at the function level. This affects FS728TLP before 1.0.1.26, GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS108Ev3 before 2.06.08, GS108PEv3 before 2.06.08, GS110EMX before 1.0.1.4, GS116Ev2 before 2.6.0.35, GS408EPP before 1.0.0.15, GS724TPv2 before 1.1.1.29, GS808E before 1.7.0.7, GS810EMX before 1.7.1.1, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15, GSS116E before 1.6.0.9, JGS516PE before 2.6.0.35, JGS524Ev2 before 2.6.0.35, JGS524PE before 2.6.0.35, XS512EM before 1.0.1.1, XS708Ev2 before 1.6.0.23, XS716E before 1.6.0.23, and XS724EM before 1.0.1.1.\"}, {\"lang\": \"es\", \"value\": \"Determinados dispositivos NETGEAR est\\u00e1n afectados por una falta de control de acceso en el nivel de funci\\u00f3n. Esto afecta a FS728TLP versiones anteriores a 1.0.1.26, GS105Ev2 versiones anteriores a 1.6.0.4, GS105PE versiones anteriores a 1.6.0.4, GS108Ev3 versiones anteriores a 2.06.08, GS108PEv3 versiones anteriores a 2.06.08, GS110EMX versiones anteriores a 1.0.1.4, GS116Ev2 versiones anteriores a 2.6.0.35, GS408EPP versiones anteriores a 1.0.0.15, GS724TPv2 versiones anteriores a 1.1.1.29, GS808E versiones anteriores a 1.7.0.7, GS810EMX versiones anteriores a 1.7.1.1, GS908E versiones anteriores a 1.7.0.3, GSS108E versiones anteriores a 1.6.0.4, GSS108EPP versiones anteriores a 1.0.0.15, GSS116E versiones anteriores a 1.6.0.9, JGS516PE versiones anteriores a 2.6.0.35, JGS524Ev2 versiones anteriores a 2.6.0.35, JGS524PE versiones anteriores a 2.6.0.35, XS512EM versiones anteriores a 1.0.1.1, XS708Ev2 versiones anteriores a 1.6.0.23, XS716E versiones anteriores a 1.6.0.23 y XS724EM versiones anteriores a 1.0.1.1.\"}]",
"id": "CVE-2019-20676",
"lastModified": "2024-11-21T04:39:03.200",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 6.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.2}], \"cvssMetricV30\": [{\"source\": \"cve@mitre.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 6.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:N\", \"baseScore\": 3.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-04-15T20:15:14.333",
"references": "[{\"url\": \"https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-20676\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-04-15T20:15:14.333\",\"lastModified\":\"2024-11-21T04:39:03.200\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain NETGEAR devices are affected by lack of access control at the function level. This affects FS728TLP before 1.0.1.26, GS105Ev2 before 1.6.0.4, GS105PE before 1.6.0.4, GS108Ev3 before 2.06.08, GS108PEv3 before 2.06.08, GS110EMX before 1.0.1.4, GS116Ev2 before 2.6.0.35, GS408EPP before 1.0.0.15, GS724TPv2 before 1.1.1.29, GS808E before 1.7.0.7, GS810EMX before 1.7.1.1, GS908E before 1.7.0.3, GSS108E before 1.6.0.4, GSS108EPP before 1.0.0.15, GSS116E before 1.6.0.9, JGS516PE before 2.6.0.35, JGS524Ev2 before 2.6.0.35, JGS524PE before 2.6.0.35, XS512EM before 1.0.1.1, XS708Ev2 before 1.6.0.23, XS716E before 1.6.0.23, and XS724EM before 1.0.1.1.\"},{\"lang\":\"es\",\"value\":\"Determinados dispositivos NETGEAR est\u00e1n afectados por una falta de control de acceso en el nivel de funci\u00f3n. Esto afecta a FS728TLP versiones anteriores a 1.0.1.26, GS105Ev2 versiones anteriores a 1.6.0.4, GS105PE versiones anteriores a 1.6.0.4, GS108Ev3 versiones anteriores a 2.06.08, GS108PEv3 versiones anteriores a 2.06.08, GS110EMX versiones anteriores a 1.0.1.4, GS116Ev2 versiones anteriores a 2.6.0.35, GS408EPP versiones anteriores a 1.0.0.15, GS724TPv2 versiones anteriores a 1.1.1.29, GS808E versiones anteriores a 1.7.0.7, GS810EMX versiones anteriores a 1.7.1.1, GS908E versiones anteriores a 1.7.0.3, GSS108E versiones anteriores a 1.6.0.4, GSS108EPP versiones anteriores a 1.0.0.15, GSS116E versiones anteriores a 1.6.0.9, JGS516PE versiones anteriores a 2.6.0.35, JGS524Ev2 versiones anteriores a 2.6.0.35, JGS524PE versiones anteriores a 2.6.0.35, XS512EM versiones anteriores a 1.0.1.1, XS708Ev2 versiones anteriores a 1.6.0.23, XS716E versiones anteriores a 1.6.0.23 y XS724EM versiones anteriores a 1.0.1.1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":5.2}],\"cvssMetricV30\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:fs728tlp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.26\",\"matchCriteriaId\":\"5A5F92D9-065E-40AA-BDBA-73E2671C961A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:fs728tlp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4EEBDAE-AE10-43F2-BB8A-73CE293848D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs105e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.0.4\",\"matchCriteriaId\":\"FBF196D1-A0B3-443D-88A0-AA2E096C57F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs105e:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD993BAB-DF89-41AB-936B-9C6F280BAE1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs105pe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.0.4\",\"matchCriteriaId\":\"F0E0CE18-6EA8-41F5-8984-1FEB91561127\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs105pe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"211D1DBE-5D7A-4309-A125-126AF2A16647\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs108e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.06.08\",\"matchCriteriaId\":\"DDE4B26A-8305-40B9-8A70-59626881EEEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs108e:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5579C6E3-866F-4E6A-BD4C-0A1239DE5699\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs108pe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.06.08\",\"matchCriteriaId\":\"114E9F01-DD89-488E-9D95-33C420AEC7CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs108pe:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA97C4B-C592-4418-8F3B-24C891D3C830\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs110emx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.4\",\"matchCriteriaId\":\"D83E3054-7E97-49C1-B694-B0118200ACEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs110emx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E1EEC50-F8C6-4B34-AB0A-EC5466FF7A74\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs116e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.0.35\",\"matchCriteriaId\":\"8377DD76-5028-4BB1-B670-453ECCB9BE2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs116e:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DA5EF92-9B28-4C81-8A95-C5BCEC19591A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs408epp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.15\",\"matchCriteriaId\":\"A902F828-C55A-45B9-81D5-641FFE0ACD2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs408epp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E8C803-F6E4-4CFD-B9BA-D83A7C5269E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.1.29\",\"matchCriteriaId\":\"0515B176-5785-4ABB-BE14-7E2B1766325A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E871CCB4-8093-44AE-B289-CF81F82A9DB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs808e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.7.0.7\",\"matchCriteriaId\":\"D0DC63B1-22DB-4509-A468-9D1B63C997E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs808e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBE41AE-2001-4539-9F63-710EDEE42629\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs810emx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.7.1.1\",\"matchCriteriaId\":\"A8E8C971-788E-4D6D-B8BB-B65B2813EE5C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs810emx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91F71973-C209-4401-B887-9399F9552D7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gs908e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.7.0.3\",\"matchCriteriaId\":\"7D4E120D-3609-40F0-86B3-E7A2BC774D40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gs908e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CA61D2-1B85-4C5F-86CA-AB1F877243FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gss108e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.0.4\",\"matchCriteriaId\":\"3350D6E6-522C-4D9F-9D74-EE3A2FB9177E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gss108e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8244C4BA-F166-4C32-BF43-0964CD99921B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gss108epp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.15\",\"matchCriteriaId\":\"E2106BBF-F216-4CBE-915C-B9680BB8B4EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gss108epp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EF32417-92E9-4D8B-913A-539A473A2673\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:gss116e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.0.9\",\"matchCriteriaId\":\"5987DE76-B142-43AD-A06A-EED97FBEDC25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:gss116e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C7E2A39-F250-49EB-AE39-A1745B8F1569\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.0.35\",\"matchCriteriaId\":\"7C97166D-7ED9-477D-A246-113BAFFED0C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:jgs516pe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC0DAB-226E-4C95-9818-7758D37EFD10\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:jgs524e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.0.35\",\"matchCriteriaId\":\"573A1DF4-2441-4B8C-9A01-6CC6BAF2B48E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:jgs524e:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF899BD-AA1E-4C47-BCFD-5E32F75F538A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:jgs524pe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.0.35\",\"matchCriteriaId\":\"32DC5F31-3757-4739-8A10-F44DA2637080\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:jgs524pe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4A32288-19B5-4A8F-B883-FCC326B7032D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:xs512em_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"A39A00BE-2EAA-4893-AE8C-EB5B15C1E8DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:xs512em:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48FCC8F7-1043-4069-924D-0124FE5D10B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:xs708e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.0.23\",\"matchCriteriaId\":\"43A13AEB-F9FC-4F7D-812E-F28CE368F9E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:xs708e:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD93BF51-A52C-422F-BB05-63CF9E97D3B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:xs716e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.0.23\",\"matchCriteriaId\":\"3F96E693-D402-4ECB-B2E1-28A06810B9F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:xs716e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6BBBDF-8E4C-42B3-9B23-C0970F5C4B7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:xs724em_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"6C642EB2-F5F9-43B9-8F14-EF70F2429A46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:xs724em:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30918F59-D8C5-4A49-A10D-A5703261CCE1\"}]}]}],\"references\":[{\"url\":\"https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.netgear.com/000061463/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Switches-PSV-2018-0542\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…