cve-2019-20756
Vulnerability from cvelistv5
Published
2020-04-16 21:08
Modified
2024-08-05 02:53
Severity ?
EPSS score ?
Summary
Certain NETGEAR devices are affected by reflected XSS. This affects EX7000 before 1.0.0.64, EX6200 before 1.0.3.86, EX6150 before 1.0.0.38, EX6130 before 1.0.0.22, EX6120 before 1.0.0.40, EX6100 before 1.0.2.22, EX6000 before 1.0.0.30, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, R8300 before 1.0.2.94, R7300DST before 1.0.0.62, R7000P before 1.3.0.20, R6900P before 1.3.0.20, R6400 before 1.0.1.32, R6300v2 before 1.0.4.24, R8500 before 1.0.2.94, WNDR3400v3 before 1.0.1.18, and WN2500RPv2 before 1.0.1.52.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:53:09.007Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.netgear.com/000060643/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-0709" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain NETGEAR devices are affected by reflected XSS. This affects EX7000 before 1.0.0.64, EX6200 before 1.0.3.86, EX6150 before 1.0.0.38, EX6130 before 1.0.0.22, EX6120 before 1.0.0.40, EX6100 before 1.0.2.22, EX6000 before 1.0.0.30, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, R8300 before 1.0.2.94, R7300DST before 1.0.0.62, R7000P before 1.3.0.20, R6900P before 1.3.0.20, R6400 before 1.0.1.32, R6300v2 before 1.0.4.24, R8500 before 1.0.2.94, WNDR3400v3 before 1.0.1.18, and WN2500RPv2 before 1.0.1.52." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:A/A:N/C:H/I:L/PR:N/S:U/UI:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-16T21:08:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.netgear.com/000060643/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-0709" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-20756", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain NETGEAR devices are affected by reflected XSS. This affects EX7000 before 1.0.0.64, EX6200 before 1.0.3.86, EX6150 before 1.0.0.38, EX6130 before 1.0.0.22, EX6120 before 1.0.0.40, EX6100 before 1.0.2.22, EX6000 before 1.0.0.30, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, R8300 before 1.0.2.94, R7300DST before 1.0.0.62, R7000P before 1.3.0.20, R6900P before 1.3.0.20, R6400 before 1.0.1.32, R6300v2 before 1.0.4.24, R8500 before 1.0.2.94, WNDR3400v3 before 1.0.1.18, and WN2500RPv2 before 1.0.1.52." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT", "availabilityImpact": "NONE", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AC:L/AV:A/A:N/C:H/I:L/PR:N/S:U/UI:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.netgear.com/000060643/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-0709", "refsource": "CONFIRM", "url": "https://kb.netgear.com/000060643/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-0709" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-20756", "datePublished": "2020-04-16T21:08:55", "dateReserved": "2020-04-15T00:00:00", "dateUpdated": "2024-08-05T02:53:09.007Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.64\", \"matchCriteriaId\": \"E2EC7119-878C-4E8F-97B0-DAD86E138F8C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F45B620-60B8-40F3-A055-181ADD71EFFF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.3.86\", \"matchCriteriaId\": \"03DFA0CD-2C01-4885-B126-E24FCA5F9D6B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3186CC67-B567-4A0C-BD2C-0433716FBD1B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6150_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.38\", \"matchCriteriaId\": \"F10249E2-7DDE-4E3D-91FE-FB3FBA3682B0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6150:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46452E97-9347-4788-9570-1EECECC7255E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.22\", \"matchCriteriaId\": \"09C02A78-A382-43A0-A20F-D6521F6DD57F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"305E295C-9C73-4798-A0BE-7973E1EE5EAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.40\", \"matchCriteriaId\": \"12C1BB59-1A89-45B9-A1D2-6D8DFEEC2F16\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C6DFDB6-1D7A-459A-8D30-FD4900ED718B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6100_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.2.22\", \"matchCriteriaId\": \"746ADED9-4517-4482-AAEF-ACD301B433F8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB84CD03-765C-4D4F-A176-364F8E72A4E7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6000_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.30\", \"matchCriteriaId\": \"7147AB6A-80B2-4468-BF13-5B7554AA5DA3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02E7CA7E-E6CA-4BAB-8F40-4731EA523D91\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.70\", \"matchCriteriaId\": \"54C9BF9A-F891-4337-AAFF-6E192A81B45B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDAA5899-B73C-4690-853E-B5400F034BE1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.70\", \"matchCriteriaId\": \"74109B25-B64E-4166-A7B0-E3DA87B89161\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC5488D9-651C-4BAB-A141-06B816690D42\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.2.94\", \"matchCriteriaId\": \"A18E8950-B107-4050-AFEF-30C20F6166FA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A9B77E7-7439-48C6-989F-5E22CB4D3044\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.62\", \"matchCriteriaId\": \"999A4F9A-D803-47D0-94F5-4626669D8DE0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C75148EB-DE6C-4C5C-BF34-4800A66CF11C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.3.0.20\", \"matchCriteriaId\": \"EFFC911D-B2A3-47D7-940A-76978458CEA5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFE55F4D-E98B-46D3-B870-041141934CD1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.3.0.20\", \"matchCriteriaId\": \"0CB1E644-FB4B-443B-B9D7-349F0024FB74\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41908FF-AE64-4949-80E3-BEE061B2DA8A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.32\", \"matchCriteriaId\": \"97DE1C91-59A0-4902-B5C7-0CFD2631CAEE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E4CDF6B-3829-44D0-9675-71D7BE83CAA2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.4.24\", \"matchCriteriaId\": \"110B10A0-1969-4FDE-9289-6EAB81D1657B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10938043-F7DF-42C3-8C16-F92CAF8E5576\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.2.94\", \"matchCriteriaId\": \"58EFB06D-AD59-4F40-B6EC-BD3C1BCACE7A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63500DE4-BDBD-4F86-AB99-7DB084D0B912\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.18\", \"matchCriteriaId\": \"38BC0F78-4571-45E6-9023-CD1AEA7DF8EF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1992E44C-122C-41BC-8FDC-5F9EBEE1FB7C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:wn2500rp_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.52\", \"matchCriteriaId\": \"6DFB128D-2F6F-439B-AFE0-FAAE762F008D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:wn2500rp:v2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C4C1B98-9551-4862-AEAC-3D5C313BD275\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Certain NETGEAR devices are affected by reflected XSS. This affects EX7000 before 1.0.0.64, EX6200 before 1.0.3.86, EX6150 before 1.0.0.38, EX6130 before 1.0.0.22, EX6120 before 1.0.0.40, EX6100 before 1.0.2.22, EX6000 before 1.0.0.30, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, R8300 before 1.0.2.94, R7300DST before 1.0.0.62, R7000P before 1.3.0.20, R6900P before 1.3.0.20, R6400 before 1.0.1.32, R6300v2 before 1.0.4.24, R8500 before 1.0.2.94, WNDR3400v3 before 1.0.1.18, and WN2500RPv2 before 1.0.1.52.\"}, {\"lang\": \"es\", \"value\": \"Determinados dispositivos NETGEAR est\\u00e1n afectados por una vulnerabilidad de tipo XSS reflejado. Esto afecta a EX7000 versiones anteriores a 1.0.0.64, EX6200 versiones anteriores a 1.0.3.86, EX6150 versiones anteriores a 1.0.0.38, EX6130 versiones anteriores a 1.0.0.22, EX6120 versiones anteriores a 1.0.0.40, EX6100 versiones anteriores a 1.0.2.22, EX6000 versiones anteriores a 1.0.0.30, EX3700 versiones anteriores a 1.0.0.70, EX3800 versiones anteriores a 1.0.0. 70, R8300 versiones anteriores a 1.0.2.94, R7300DST versiones anteriores a 1.0.0.62, R7000P versiones anteriores a 1.3.0.20, R6900P versiones anteriores a 1.3.0.20, R6400 versiones anteriores a 1.0.1.32, R6300v2 versiones anteriores a 1.0.4.24, R8500 versiones anteriores a 1.0.2.94, WNDR3400v3 versiones anteriores a 1.0.1.18, y WN2500RPv2 versiones anteriores a 1.0.1.52.\"}]", "id": "CVE-2019-20756", "lastModified": "2024-11-21T04:39:16.957", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV30\": [{\"source\": \"cve@mitre.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N\", \"baseScore\": 7.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2020-04-16T22:15:12.977", "references": "[{\"url\": \"https://kb.netgear.com/000060643/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-0709\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://kb.netgear.com/000060643/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-0709\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-20756\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-04-16T22:15:12.977\",\"lastModified\":\"2024-11-21T04:39:16.957\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain NETGEAR devices are affected by reflected XSS. This affects EX7000 before 1.0.0.64, EX6200 before 1.0.3.86, EX6150 before 1.0.0.38, EX6130 before 1.0.0.22, EX6120 before 1.0.0.40, EX6100 before 1.0.2.22, EX6000 before 1.0.0.30, EX3700 before 1.0.0.70, EX3800 before 1.0.0.70, R8300 before 1.0.2.94, R7300DST before 1.0.0.62, R7000P before 1.3.0.20, R6900P before 1.3.0.20, R6400 before 1.0.1.32, R6300v2 before 1.0.4.24, R8500 before 1.0.2.94, WNDR3400v3 before 1.0.1.18, and WN2500RPv2 before 1.0.1.52.\"},{\"lang\":\"es\",\"value\":\"Determinados dispositivos NETGEAR est\u00e1n afectados por una vulnerabilidad de tipo XSS reflejado. Esto afecta a EX7000 versiones anteriores a 1.0.0.64, EX6200 versiones anteriores a 1.0.3.86, EX6150 versiones anteriores a 1.0.0.38, EX6130 versiones anteriores a 1.0.0.22, EX6120 versiones anteriores a 1.0.0.40, EX6100 versiones anteriores a 1.0.2.22, EX6000 versiones anteriores a 1.0.0.30, EX3700 versiones anteriores a 1.0.0.70, EX3800 versiones anteriores a 1.0.0. 70, R8300 versiones anteriores a 1.0.2.94, R7300DST versiones anteriores a 1.0.0.62, R7000P versiones anteriores a 1.3.0.20, R6900P versiones anteriores a 1.3.0.20, R6400 versiones anteriores a 1.0.1.32, R6300v2 versiones anteriores a 1.0.4.24, R8500 versiones anteriores a 1.0.2.94, WNDR3400v3 versiones anteriores a 1.0.1.18, y WN2500RPv2 versiones anteriores a 1.0.1.52.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV30\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.64\",\"matchCriteriaId\":\"E2EC7119-878C-4E8F-97B0-DAD86E138F8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F45B620-60B8-40F3-A055-181ADD71EFFF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.3.86\",\"matchCriteriaId\":\"03DFA0CD-2C01-4885-B126-E24FCA5F9D6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3186CC67-B567-4A0C-BD2C-0433716FBD1B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6150_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.38\",\"matchCriteriaId\":\"F10249E2-7DDE-4E3D-91FE-FB3FBA3682B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46452E97-9347-4788-9570-1EECECC7255E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.22\",\"matchCriteriaId\":\"09C02A78-A382-43A0-A20F-D6521F6DD57F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"305E295C-9C73-4798-A0BE-7973E1EE5EAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.40\",\"matchCriteriaId\":\"12C1BB59-1A89-45B9-A1D2-6D8DFEEC2F16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6DFDB6-1D7A-459A-8D30-FD4900ED718B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6100_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.22\",\"matchCriteriaId\":\"746ADED9-4517-4482-AAEF-ACD301B433F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB84CD03-765C-4D4F-A176-364F8E72A4E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.30\",\"matchCriteriaId\":\"7147AB6A-80B2-4468-BF13-5B7554AA5DA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E7CA7E-E6CA-4BAB-8F40-4731EA523D91\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.70\",\"matchCriteriaId\":\"54C9BF9A-F891-4337-AAFF-6E192A81B45B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDAA5899-B73C-4690-853E-B5400F034BE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.70\",\"matchCriteriaId\":\"74109B25-B64E-4166-A7B0-E3DA87B89161\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5488D9-651C-4BAB-A141-06B816690D42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.94\",\"matchCriteriaId\":\"A18E8950-B107-4050-AFEF-30C20F6166FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9B77E7-7439-48C6-989F-5E22CB4D3044\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.62\",\"matchCriteriaId\":\"999A4F9A-D803-47D0-94F5-4626669D8DE0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75148EB-DE6C-4C5C-BF34-4800A66CF11C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.0.20\",\"matchCriteriaId\":\"EFFC911D-B2A3-47D7-940A-76978458CEA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE55F4D-E98B-46D3-B870-041141934CD1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.0.20\",\"matchCriteriaId\":\"0CB1E644-FB4B-443B-B9D7-349F0024FB74\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41908FF-AE64-4949-80E3-BEE061B2DA8A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.32\",\"matchCriteriaId\":\"97DE1C91-59A0-4902-B5C7-0CFD2631CAEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4CDF6B-3829-44D0-9675-71D7BE83CAA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.4.24\",\"matchCriteriaId\":\"110B10A0-1969-4FDE-9289-6EAB81D1657B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10938043-F7DF-42C3-8C16-F92CAF8E5576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.94\",\"matchCriteriaId\":\"58EFB06D-AD59-4F40-B6EC-BD3C1BCACE7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63500DE4-BDBD-4F86-AB99-7DB084D0B912\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.18\",\"matchCriteriaId\":\"38BC0F78-4571-45E6-9023-CD1AEA7DF8EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1992E44C-122C-41BC-8FDC-5F9EBEE1FB7C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:wn2500rp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.52\",\"matchCriteriaId\":\"6DFB128D-2F6F-439B-AFE0-FAAE762F008D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:wn2500rp:v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4C1B98-9551-4862-AEAC-3D5C313BD275\"}]}]}],\"references\":[{\"url\":\"https://kb.netgear.com/000060643/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-0709\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.netgear.com/000060643/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Some-Routers-and-Extenders-PSV-2017-0709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.