var-202112-2282
Vulnerability from variot
Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7960P before 1.4.1.66, RAX200 before 1.0.3.106, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, EX3700 before 1.0.0.90, MR60 before 1.0.6.110, R8000P before 1.4.1.66, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, EX3800 before 1.0.0.90, MS60 before 1.0.6.110, R7900P before 1.4.1.66, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. plural NETGEAR A cross-site scripting vulnerability exists in the device.Information may be obtained and information may be tampered with. This affects CBR40 prior to 2.5.0.10, EAX20 prior to 1.0.0.48, EAX80 prior to 1.0.1.64, EX6120 prior to 1.0.0.64, EX6130 prior to 1.0.0.44, EX7500 prior to 1.0.0.72, R7960P prior to 1.4.1.66, RAX200 prior to 1.0.3.106, RBS40V prior to 2.6.1.4, RBW30 prior to 2.6.1.4, EX3700 prior to 1.0.0.90, MR60 prior to 1.0.6.110, R8000P prior to 1.4.1.66, RAX20 prior to 1.0.2.82, RAX45 prior to 1.0.2.72, RAX80 prior to 1.0.3.106, EX3800 prior to 1.0.0.90, MS60 prior to 1.0.6.110, R7900P prior to 1.4.1.66, RAX15 prior to 1.0.2.82, RAX50 prior to 1.0.2.72, RAX75 prior to 1.0.3.106, RBR750 prior to 3.2.16.6, RBR850 prior to 3.2.16.6, RBS750 prior to 3.2.16.6, RBS850 prior to 3.2.16.6, RBK752 prior to 3.2.16.6, and RBK852 prior to 3.2.16.6
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-2282", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "eax80", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.1.64", }, { model: "ex6130", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.44", }, { model: "ex3800", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.90", }, { model: "ms60", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.6.110", }, { model: "r7900p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.66", }, { model: "rbk852", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "ex6120", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.64", }, { model: "rbs850", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "r7960p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.66", }, { model: "rbk752", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rax200", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.106", }, { model: "mr60", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.6.110", }, { model: "cbr40", scope: "lt", trust: 1, vendor: "netgear", version: "2.5.0.10", }, { model: "rax80", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.106", }, { model: "rbr750", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "ex3700", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.90", }, { model: "rax50", scope: "lte", trust: 1, vendor: "netgear", version: "1.0.2.72", }, { model: "eax20", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.48", }, { model: "ex7500", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.0.72", }, { model: "rax20", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.82", }, { model: "rbw30", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.4", }, { model: "rax15", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.82", }, { model: "r8000p", scope: "lt", trust: 1, vendor: "netgear", version: "1.4.1.66", }, { model: "rax75", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.3.106", }, { model: "rbs40v", scope: "lt", trust: 1, vendor: "netgear", version: "2.6.1.4", }, { model: "rbs750", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rbr850", scope: "lt", trust: 1, vendor: "netgear", version: "3.2.16.6", }, { model: "rax45", scope: "lt", trust: 1, vendor: "netgear", version: "1.0.2.72", }, { model: "ex7500", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ex6120", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "r7960p", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "eax20", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "eax80", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "ex6130", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "rbs40v", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "rbw30", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "cbr40", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, { model: "rax200", scope: null, trust: 0.8, vendor: "ネットギア", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-017172", }, { db: "NVD", id: "CVE-2021-45667", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.5.0.10", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.48", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.1.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.64", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.44", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.66", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.106", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs40v_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.4", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs40v:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbw30_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.6.1.4", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbw30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.90", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.6.110", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.66", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.82", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.106", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.0.90", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.6.110", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.4.1.66", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.2.82", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "1.0.2.72", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.0.3.106", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.16.6", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2021-45667", }, ], }, cve: "CVE-2021-45667", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", author: "NVD", availabilityImpact: "NONE", baseScore: 3.5, confidentialityImpact: "NONE", exploitabilityScore: 6.8, impactScore: 2.9, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", trust: 1, userInteractionRequired: true, vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Network", authentication: "Single", author: "NVD", availabilityImpact: "None", baseScore: 3.5, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2021-45667", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Low", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "NVD", availabilityImpact: "NONE", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", exploitabilityScore: 1.7, impactScore: 2.7, integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", author: "cve@mitre.org", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", exploitabilityScore: 0.7, impactScore: 5.3, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:L", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "None", baseScore: 4.8, baseSeverity: "Medium", confidentialityImpact: "Low", exploitabilityScore: null, id: "CVE-2021-45667", impactScore: null, integrityImpact: "Low", privilegesRequired: "High", scope: "Changed", trust: 0.8, userInteraction: "Required", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2021-45667", trust: 1.8, value: "MEDIUM", }, { author: "cve@mitre.org", id: "CVE-2021-45667", trust: 1, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202112-2463", trust: 0.6, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2021-45667", trust: 0.1, value: "LOW", }, ], }, ], sources: [ { db: "VULMON", id: "CVE-2021-45667", }, { db: "JVNDB", id: "JVNDB-2021-017172", }, { db: "NVD", id: "CVE-2021-45667", }, { db: "NVD", id: "CVE-2021-45667", }, { db: "CNNVD", id: "CNNVD-202112-2463", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7960P before 1.4.1.66, RAX200 before 1.0.3.106, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, EX3700 before 1.0.0.90, MR60 before 1.0.6.110, R8000P before 1.4.1.66, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, EX3800 before 1.0.0.90, MS60 before 1.0.6.110, R7900P before 1.4.1.66, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. plural NETGEAR A cross-site scripting vulnerability exists in the device.Information may be obtained and information may be tampered with. This affects CBR40 prior to 2.5.0.10, EAX20 prior to 1.0.0.48, EAX80 prior to 1.0.1.64, EX6120 prior to 1.0.0.64, EX6130 prior to 1.0.0.44, EX7500 prior to 1.0.0.72, R7960P prior to 1.4.1.66, RAX200 prior to 1.0.3.106, RBS40V prior to 2.6.1.4, RBW30 prior to 2.6.1.4, EX3700 prior to 1.0.0.90, MR60 prior to 1.0.6.110, R8000P prior to 1.4.1.66, RAX20 prior to 1.0.2.82, RAX45 prior to 1.0.2.72, RAX80 prior to 1.0.3.106, EX3800 prior to 1.0.0.90, MS60 prior to 1.0.6.110, R7900P prior to 1.4.1.66, RAX15 prior to 1.0.2.82, RAX50 prior to 1.0.2.72, RAX75 prior to 1.0.3.106, RBR750 prior to 3.2.16.6, RBR850 prior to 3.2.16.6, RBS750 prior to 3.2.16.6, RBS850 prior to 3.2.16.6, RBK752 prior to 3.2.16.6, and RBK852 prior to 3.2.16.6", sources: [ { db: "NVD", id: "CVE-2021-45667", }, { db: "JVNDB", id: "JVNDB-2021-017172", }, { db: "VULMON", id: "CVE-2021-45667", }, ], trust: 1.71, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2021-45667", trust: 3.3, }, { db: "JVNDB", id: "JVNDB-2021-017172", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202112-2463", trust: 0.6, }, { db: "VULMON", id: "CVE-2021-45667", trust: 0.1, }, ], sources: [ { db: "VULMON", id: "CVE-2021-45667", }, { db: "JVNDB", id: "JVNDB-2021-017172", }, { db: "NVD", id: "CVE-2021-45667", }, { db: "CNNVD", id: "CNNVD-202112-2463", }, ], }, id: "VAR-202112-2282", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.28974017916666667, }, last_update_date: "2023-12-18T12:34:42.631000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Security Advisory for Stored Cross Site Scripting on Some Router, Extenders, and WiFi Systems, PSV-2020-0256", trust: 0.8, url: "https://kb.netgear.com/000064481/security-advisory-for-stored-cross-site-scripting-on-some-router-extenders-and-wifi-systems-psv-2020-0256", }, { title: "Netgear RBR750 and NETGEAR Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176225", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-017172", }, { db: "CNNVD", id: "CNNVD-202112-2463", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-79", trust: 1, }, { problemtype: "Cross-site scripting (CWE-79) [NVD evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-017172", }, { db: "NVD", id: "CVE-2021-45667", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://kb.netgear.com/000064481/security-advisory-for-stored-cross-site-scripting-on-some-router-extenders-and-wifi-systems-psv-2020-0256", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2021-45667", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/79.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "VULMON", id: "CVE-2021-45667", }, { db: "JVNDB", id: "JVNDB-2021-017172", }, { db: "NVD", id: "CVE-2021-45667", }, { db: "CNNVD", id: "CNNVD-202112-2463", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULMON", id: "CVE-2021-45667", }, { db: "JVNDB", id: "JVNDB-2021-017172", }, { db: "NVD", id: "CVE-2021-45667", }, { db: "CNNVD", id: "CNNVD-202112-2463", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-12-26T00:00:00", db: "VULMON", id: "CVE-2021-45667", }, { date: "2023-01-06T00:00:00", db: "JVNDB", id: "JVNDB-2021-017172", }, { date: "2021-12-26T01:15:20.870000", db: "NVD", id: "CVE-2021-45667", }, { date: "2021-12-26T00:00:00", db: "CNNVD", id: "CNNVD-202112-2463", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-01-06T00:00:00", db: "VULMON", id: "CVE-2021-45667", }, { date: "2023-01-06T05:40:00", db: "JVNDB", id: "JVNDB-2021-017172", }, { date: "2022-01-06T14:49:43.127000", db: "NVD", id: "CVE-2021-45667", }, { date: "2022-01-07T00:00:00", db: "CNNVD", id: "CNNVD-202112-2463", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202112-2463", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural NETGEAR Cross-site scripting vulnerabilities in devices", sources: [ { db: "JVNDB", id: "JVNDB-2021-017172", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "XSS", sources: [ { db: "CNNVD", id: "CNNVD-202112-2463", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.