Vulnerability Name: CVE-2018-21197 (CCN-181145) Assigned: 2018-02-26 Published: 2018-02-26 Updated: 2020-05-05 Summary: Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D7800 before 1.0.1.34, R6100 before 1.0.1.22, R7500 before 1.0.0.122, R7500v2 before 1.0.3.26, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62. CVSS v3 Severity: 6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H )5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): AdjacentAttack Complexity (AC): LowPrivileges Required (PR): HighUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H )5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): AdjacentAttack Complexity (AC): LowPrivileges Required (PR): HighUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 5.2 Medium (CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): Adjacent_NetworkAccess Complexity (AC): LowAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.7 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): Adjacent_NetworkAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-787 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2018-21197 Source: XF Type: UNKNOWNnetgear-cve201821197-bo(181145) Source: CCN Type: NETGEAR Security Advisory: PSV-2017-2596Security Advisory for Post-Authentication Stack Overflow on Some Routers and Gateways Source: CONFIRM Type: Vendor Advisoryhttps://kb.netgear.com/000055152/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2596 Vulnerable Configuration: Configuration 1 :cpe:/o:netgear:d7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.34)AND cpe:/h:netgear:d7800:-:*:*:*:*:*:*:* Configuration 2 :cpe:/o:netgear:r6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.22)AND cpe:/h:netgear:r6100:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:netgear:r7500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.26)AND cpe:/h:netgear:r7500:v2:*:*:*:*:*:*:* Configuration 4 :cpe:/o:netgear:r7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.40)AND cpe:/h:netgear:r7800:-:*:*:*:*:*:*:* Configuration 5 :cpe:/o:netgear:r9000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.52)AND cpe:/h:netgear:r9000:-:*:*:*:*:*:*:* Configuration 6 :cpe:/o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.92)AND cpe:/h:netgear:wndr3700:v4:*:*:*:*:*:*:* Configuration 7 :cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.94)AND cpe:/h:netgear:wndr4300:-:*:*:*:*:*:*:* Configuration 8 :cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.50)AND cpe:/h:netgear:wndr4300:v2:*:*:*:*:*:*:* Configuration 9 :cpe:/o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.50)AND cpe:/h:netgear:wndr4500:v3:*:*:*:*:*:*:* Configuration 10 :cpe:/o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.62)AND cpe:/h:netgear:wnr2000:v5:*:*:*:*:*:*:* Configuration 11 :cpe:/o:netgear:r7500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.122)AND cpe:/h:netgear:r7500:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:netgear:r7800_firmware:1.0.2:*:*:*:*:*:*:* OR cpe:/o:netgear:r7500v2_firmware:1.0.3:*:*:*:*:*:*:* OR cpe:/o:netgear:d7800_firmware:1.0.1:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr3700v4_firmware:1.0.2:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4300_firmware:1.0.2:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4300v2_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:wnr2000v5_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:wndr4500v3_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:r6100_firmware:1.0.1:*:*:*:*:*:*:* OR cpe:/o:netgear:r7500_firmware:1.0.0:*:*:*:*:*:*:* OR cpe:/o:netgear:r9000_firmware:1.0.2:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
netgear d7800 firmware *
netgear d7800 -
netgear r6100 firmware *
netgear r6100 -
netgear r7500 firmware *
netgear r7500 v2
netgear r7800 firmware *
netgear r7800 -
netgear r9000 firmware *
netgear r9000 -
netgear wndr3700 firmware *
netgear wndr3700 v4
netgear wndr4300 firmware *
netgear wndr4300 -
netgear wndr4300 firmware *
netgear wndr4300 v2
netgear wndr4500 firmware *
netgear wndr4500 v3
netgear wnr2000 firmware *
netgear wnr2000 v5
netgear r7500 firmware *
netgear r7500 -
netgear r7800 firmware 1.0.2
netgear r7500v2 firmware 1.0.3
netgear d7800 firmware 1.0.1
netgear wndr3700v4 firmware 1.0.2
netgear wndr4300 firmware 1.0.2
netgear wndr4300v2 firmware 1.0.0
netgear wnr2000v5 firmware 1.0.0
netgear wndr4500v3 firmware 1.0.0
netgear r6100 firmware 1.0.1
netgear r7500 firmware 1.0.0
netgear r9000 firmware 1.0.2