CVE-2021-45648 (GCVE-0-2021-45648)
Vulnerability from cvelistv5 – Published: 2021-12-26 00:29 – Updated: 2024-08-04 04:47
VLAI?
Summary
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects EX6100v2 before 1.0.1.106, EX6150v2 before 1.0.1.106, EX6250 before 1.0.0.146, EX6400 before 1.0.2.164, EX6400v2 before 1.0.0.146, EX6410 before 1.0.0.146, EX6420 before 1.0.0.146, EX7300 before 1.0.2.164, EX7300v2 before 1.0.0.146, EX7320 before 1.0.0.146, EX7700 before 1.0.0.222, LBR1020 before 2.6.5.16, LBR20 before 2.6.5.2, RBK352 before 4.3.4.7, RBK50 before 2.7.3.22, RBR350 before 4.3.4.7, RBR50 before 2.7.3.22, and RBS350 before 4.3.4.7.
Severity ?
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T04:47:01.772Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kb.netgear.com/000064494/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0453"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Certain NETGEAR devices are affected by disclosure of sensitive information. This affects EX6100v2 before 1.0.1.106, EX6150v2 before 1.0.1.106, EX6250 before 1.0.0.146, EX6400 before 1.0.2.164, EX6400v2 before 1.0.0.146, EX6410 before 1.0.0.146, EX6420 before 1.0.0.146, EX7300 before 1.0.2.164, EX7300v2 before 1.0.0.146, EX7320 before 1.0.0.146, EX7700 before 1.0.0.222, LBR1020 before 2.6.5.16, LBR20 before 2.6.5.2, RBK352 before 4.3.4.7, RBK50 before 2.7.3.22, RBR350 before 4.3.4.7, RBR50 before 2.7.3.22, and RBS350 before 4.3.4.7."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:A/A:N/C:L/I:N/PR:N/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-26T00:29:37",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kb.netgear.com/000064494/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0453"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-45648",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Certain NETGEAR devices are affected by disclosure of sensitive information. This affects EX6100v2 before 1.0.1.106, EX6150v2 before 1.0.1.106, EX6250 before 1.0.0.146, EX6400 before 1.0.2.164, EX6400v2 before 1.0.0.146, EX6410 before 1.0.0.146, EX6420 before 1.0.0.146, EX7300 before 1.0.2.164, EX7300v2 before 1.0.0.146, EX7320 before 1.0.0.146, EX7700 before 1.0.0.222, LBR1020 before 2.6.5.16, LBR20 before 2.6.5.2, RBK352 before 4.3.4.7, RBK50 before 2.7.3.22, RBR350 before 4.3.4.7, RBR50 before 2.7.3.22, and RBS350 before 4.3.4.7."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT",
"availabilityImpact": "NONE",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:A/A:N/C:L/I:N/PR:N/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.netgear.com/000064494/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0453",
"refsource": "MISC",
"url": "https://kb.netgear.com/000064494/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0453"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-45648",
"datePublished": "2021-12-26T00:29:37",
"dateReserved": "2021-12-25T00:00:00",
"dateUpdated": "2024-08-04T04:47:01.772Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6100v2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.106\", \"matchCriteriaId\": \"9448185F-D941-447D-B90E-2E69CB60E739\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6100v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DCFF79A-8ACE-455B-90F3-FFC745E8BAD4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6150v2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.1.106\", \"matchCriteriaId\": \"7E4E9866-2B10-44B6-BB6E-EC1B77E08EC3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6150v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5828F04B-E373-4E4F-942D-08CCA038418C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6250_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.146\", \"matchCriteriaId\": \"CAD1DF05-2F79-4334-83EF-D0EAEB5BCDA8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7694D0C-2CC6-4A6E-A251-5CBFC67D2AA9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6400_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.2.164\", \"matchCriteriaId\": \"BB6C6DF7-00B6-458E-BC69-A8F1EA94F034\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1289BBB4-1955-46A4-B5FE-BF11153C24F5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6400v2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.146\", \"matchCriteriaId\": \"834234D5-E773-4950-96E0-E4451DCDE206\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6400v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5882095F-B22A-4937-BA08-6640140F10AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6410_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.146\", \"matchCriteriaId\": \"971A6ED9-90D3-4DBD-A5D6-7788C66E9905\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6410:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C63267D8-4632-4D14-B39C-BEEC62AD8F87\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex6420_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.146\", \"matchCriteriaId\": \"E3F5F41F-15DC-4FD4-BDA7-9351EF922C51\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex6420:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B2C00E1-4A23-4304-B92F-B7D9F4818D90\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex7300_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.2.164\", \"matchCriteriaId\": \"E2794682-2094-4FB4-A968-A914138F3143\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex7300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F285D60D-A5DA-4467-8F79-15EF8135D007\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex7300v2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.146\", \"matchCriteriaId\": \"0C26D833-D61A-4AE8-BA31-59E991292CB4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex7300v2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A88D2A3-3B22-4639-94E9-69CE80F37392\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex7320_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.146\", \"matchCriteriaId\": \"158F6EF8-613F-4EF7-95CE-D285E05FC135\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex7320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1D4DF51-84EA-4296-9E06-CE5E1F4A53D1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:ex7700_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.0.0.222\", \"matchCriteriaId\": \"037B3306-22A2-4072-80AC-7CB3FC39BC6F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:ex7700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D140E3B-9AE5-473A-82DE-9B9DBAE4C34A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:lbr1020_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.6.5.16\", \"matchCriteriaId\": \"F5A78D3C-13F1-4ABA-B26D-96F50E245520\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:lbr1020:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"953F0743-4B34-4CE9-815E-D87253720CBE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:lbr20_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.6.5.2\", \"matchCriteriaId\": \"D3441E02-8A61-43C5-AD92-F6D5A5C3DB66\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:lbr20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863E45EA-2DA0-4C9A-9B87-79E42B3FF97C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:rbk352_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.3.4.7\", \"matchCriteriaId\": \"DD2667C9-3B5F-42EB-89BE-01E628DDC326\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:rbk352:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E33DA6FB-9AEE-44DA-9FAA-164E145D8C4B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.7.3.22\", \"matchCriteriaId\": \"455B1063-8507-4713-82B3-DB1BC4B22A21\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BA66D07-D017-49D6-8E72-5C48E940DE1B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:rbr350_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.3.4.7\", \"matchCriteriaId\": \"9D56EF24-F7D3-42E4-B783-87EBAA9088BB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:rbr350:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C967BD79-D46C-4E73-9063-394454C33180\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.7.3.22\", \"matchCriteriaId\": \"C1AC74B5-C42B-40BC-8AF9-3E9E0C68084E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2CAEA32-6934-4743-9E6B-22D52AC5E7F8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:netgear:rbs350_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.3.4.7\", \"matchCriteriaId\": \"8DDD5366-ED77-49B4-BC8B-B4AECB9A5A9C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:netgear:rbs350:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D69C0384-012F-4F3C-B5B2-EE2087C8187D\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Certain NETGEAR devices are affected by disclosure of sensitive information. This affects EX6100v2 before 1.0.1.106, EX6150v2 before 1.0.1.106, EX6250 before 1.0.0.146, EX6400 before 1.0.2.164, EX6400v2 before 1.0.0.146, EX6410 before 1.0.0.146, EX6420 before 1.0.0.146, EX7300 before 1.0.2.164, EX7300v2 before 1.0.0.146, EX7320 before 1.0.0.146, EX7700 before 1.0.0.222, LBR1020 before 2.6.5.16, LBR20 before 2.6.5.2, RBK352 before 4.3.4.7, RBK50 before 2.7.3.22, RBR350 before 4.3.4.7, RBR50 before 2.7.3.22, and RBS350 before 4.3.4.7.\"}, {\"lang\": \"es\", \"value\": \"Determinados dispositivos NETGEAR est\\u00e1n afectados por una divulgaci\\u00f3n de informaci\\u00f3n confidencial. Esto afecta a EX6100v2 versiones anteriores a 1.0.1.106, a EX6150v2 versiones anteriores a 1.0.1.106, a EX6250 versiones anteriores a 1.0.0.146, a EX6400 versiones anteriores a 1.0.2.164, a EX6400v2 versiones anteriores a 1.0.0.146, a EX6410 versiones anteriores a 1.0.0.146, a EX6420 versiones anteriores a 1.0.0.146, a EX7300 versiones anteriores a 1.0.2.164, a EX7300v2 versiones anteriores a 1.0.0.146 y a EX7300v2 versiones anteriores a 1.0.2.164. 0.0.146, EX7320 versiones anteriores a 1.0.0.146, EX7700 versiones anteriores a 1.0.0.222, LBR1020 versiones anteriores a 2.6.5.16, LBR20 versiones anteriores a 2.6.5.2, RBK352 versiones anteriores a 4.3.4.7, RBK50 versiones anteriores a 2.7.3.22, RBR350 versiones anteriores a 4.3.4.7, RBR50 versiones anteriores a 2.7.3.22 y RBS350 versiones anteriores a 4.3.4.7\"}]",
"id": "CVE-2021-45648",
"lastModified": "2024-11-21T06:32:46.740",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve@mitre.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 3.1, \"baseSeverity\": \"LOW\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-12-26T01:15:20.010",
"references": "[{\"url\": \"https://kb.netgear.com/000064494/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0453\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://kb.netgear.com/000064494/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-45648\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-12-26T01:15:20.010\",\"lastModified\":\"2024-11-21T06:32:46.740\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain NETGEAR devices are affected by disclosure of sensitive information. This affects EX6100v2 before 1.0.1.106, EX6150v2 before 1.0.1.106, EX6250 before 1.0.0.146, EX6400 before 1.0.2.164, EX6400v2 before 1.0.0.146, EX6410 before 1.0.0.146, EX6420 before 1.0.0.146, EX7300 before 1.0.2.164, EX7300v2 before 1.0.0.146, EX7320 before 1.0.0.146, EX7700 before 1.0.0.222, LBR1020 before 2.6.5.16, LBR20 before 2.6.5.2, RBK352 before 4.3.4.7, RBK50 before 2.7.3.22, RBR350 before 4.3.4.7, RBR50 before 2.7.3.22, and RBS350 before 4.3.4.7.\"},{\"lang\":\"es\",\"value\":\"Determinados dispositivos NETGEAR est\u00e1n afectados por una divulgaci\u00f3n de informaci\u00f3n confidencial. Esto afecta a EX6100v2 versiones anteriores a 1.0.1.106, a EX6150v2 versiones anteriores a 1.0.1.106, a EX6250 versiones anteriores a 1.0.0.146, a EX6400 versiones anteriores a 1.0.2.164, a EX6400v2 versiones anteriores a 1.0.0.146, a EX6410 versiones anteriores a 1.0.0.146, a EX6420 versiones anteriores a 1.0.0.146, a EX7300 versiones anteriores a 1.0.2.164, a EX7300v2 versiones anteriores a 1.0.0.146 y a EX7300v2 versiones anteriores a 1.0.2.164. 0.0.146, EX7320 versiones anteriores a 1.0.0.146, EX7700 versiones anteriores a 1.0.0.222, LBR1020 versiones anteriores a 2.6.5.16, LBR20 versiones anteriores a 2.6.5.2, RBK352 versiones anteriores a 4.3.4.7, RBK50 versiones anteriores a 2.7.3.22, RBR350 versiones anteriores a 4.3.4.7, RBR50 versiones anteriores a 2.7.3.22 y RBS350 versiones anteriores a 4.3.4.7\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6100v2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.106\",\"matchCriteriaId\":\"9448185F-D941-447D-B90E-2E69CB60E739\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6100v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCFF79A-8ACE-455B-90F3-FFC745E8BAD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6150v2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.106\",\"matchCriteriaId\":\"7E4E9866-2B10-44B6-BB6E-EC1B77E08EC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6150v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5828F04B-E373-4E4F-942D-08CCA038418C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6250_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.146\",\"matchCriteriaId\":\"CAD1DF05-2F79-4334-83EF-D0EAEB5BCDA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7694D0C-2CC6-4A6E-A251-5CBFC67D2AA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.164\",\"matchCriteriaId\":\"BB6C6DF7-00B6-458E-BC69-A8F1EA94F034\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1289BBB4-1955-46A4-B5FE-BF11153C24F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6400v2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.146\",\"matchCriteriaId\":\"834234D5-E773-4950-96E0-E4451DCDE206\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6400v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5882095F-B22A-4937-BA08-6640140F10AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6410_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.146\",\"matchCriteriaId\":\"971A6ED9-90D3-4DBD-A5D6-7788C66E9905\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63267D8-4632-4D14-B39C-BEEC62AD8F87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex6420_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.146\",\"matchCriteriaId\":\"E3F5F41F-15DC-4FD4-BDA7-9351EF922C51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex6420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B2C00E1-4A23-4304-B92F-B7D9F4818D90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex7300_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.2.164\",\"matchCriteriaId\":\"E2794682-2094-4FB4-A968-A914138F3143\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex7300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F285D60D-A5DA-4467-8F79-15EF8135D007\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex7300v2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.146\",\"matchCriteriaId\":\"0C26D833-D61A-4AE8-BA31-59E991292CB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex7300v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A88D2A3-3B22-4639-94E9-69CE80F37392\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex7320_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.146\",\"matchCriteriaId\":\"158F6EF8-613F-4EF7-95CE-D285E05FC135\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex7320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1D4DF51-84EA-4296-9E06-CE5E1F4A53D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:ex7700_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.222\",\"matchCriteriaId\":\"037B3306-22A2-4072-80AC-7CB3FC39BC6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:ex7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D140E3B-9AE5-473A-82DE-9B9DBAE4C34A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:lbr1020_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.5.16\",\"matchCriteriaId\":\"F5A78D3C-13F1-4ABA-B26D-96F50E245520\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:lbr1020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"953F0743-4B34-4CE9-815E-D87253720CBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:lbr20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.5.2\",\"matchCriteriaId\":\"D3441E02-8A61-43C5-AD92-F6D5A5C3DB66\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:lbr20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863E45EA-2DA0-4C9A-9B87-79E42B3FF97C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rbk352_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3.4.7\",\"matchCriteriaId\":\"DD2667C9-3B5F-42EB-89BE-01E628DDC326\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rbk352:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E33DA6FB-9AEE-44DA-9FAA-164E145D8C4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.7.3.22\",\"matchCriteriaId\":\"455B1063-8507-4713-82B3-DB1BC4B22A21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BA66D07-D017-49D6-8E72-5C48E940DE1B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rbr350_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3.4.7\",\"matchCriteriaId\":\"9D56EF24-F7D3-42E4-B783-87EBAA9088BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rbr350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C967BD79-D46C-4E73-9063-394454C33180\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.7.3.22\",\"matchCriteriaId\":\"C1AC74B5-C42B-40BC-8AF9-3E9E0C68084E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2CAEA32-6934-4743-9E6B-22D52AC5E7F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netgear:rbs350_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.3.4.7\",\"matchCriteriaId\":\"8DDD5366-ED77-49B4-BC8B-B4AECB9A5A9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netgear:rbs350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D69C0384-012F-4F3C-B5B2-EE2087C8187D\"}]}]}],\"references\":[{\"url\":\"https://kb.netgear.com/000064494/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0453\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://kb.netgear.com/000064494/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…