Vulnerability Name:

CVE-2018-21196

Assigned:2020-04-28
Published:2020-04-28
Updated:2020-05-05
Summary:Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R6100 before 1.0.1.20, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, and WNR2000v5 before 1.0.0.62.
CVSS v3 Severity:6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.2 Medium (CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.2 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-787
References:Source: MITRE
Type: CNA
CVE-2018-21196

Source: CONFIRM
Type: Vendor Advisory
https://kb.netgear.com/000055153/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2599

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netgear:d6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.57)
  • AND
  • cpe:/h:netgear:d6100:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:netgear:r6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.20)
  • AND
  • cpe:/h:netgear:r6100:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:netgear:r7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.40)
  • AND
  • cpe:/h:netgear:r7800:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:netgear:r9000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.52)
  • AND
  • cpe:/h:netgear:r9000:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.92)
  • AND
  • cpe:/h:netgear:wndr3700:v4:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.94)
  • AND
  • cpe:/h:netgear:wndr4300:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.62)
  • AND
  • cpe:/h:netgear:wnr2000:v5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netgear d6100 firmware *
    netgear d6100 -
    netgear r6100 firmware *
    netgear r6100 -
    netgear r7800 firmware *
    netgear r7800 -
    netgear r9000 firmware *
    netgear r9000 -
    netgear wndr3700 firmware *
    netgear wndr3700 v4
    netgear wndr4300 firmware *
    netgear wndr4300 -
    netgear wnr2000 firmware *
    netgear wnr2000 v5