Vulnerability Name:

CVE-2018-21201 (CCN-181143)

Assigned:2018-02-26
Published:2018-02-26
Updated:2020-05-04
Summary:Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R6100 before 1.0.1.20, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
CVSS v3 Severity:6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.2 Medium (CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.7 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2018-21201

Source: XF
Type: UNKNOWN
netgear-cve201821201-bo(181143)

Source: CCN
Type: NETGEAR Security Advisory: PSV-2017-2591
Security Advisory for Post-Authentication Stack Overflow on Some Routers and Gateways

Source: CONFIRM
Type: Vendor Advisory
https://kb.netgear.com/000055148/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2591

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netgear:d6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.57)
  • AND
  • cpe:/h:netgear:d6100:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:netgear:r6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.20)
  • AND
  • cpe:/h:netgear:r6100:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:netgear:r7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.40)
  • AND
  • cpe:/h:netgear:r7800:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:netgear:r9000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.52)
  • AND
  • cpe:/h:netgear:r9000:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.92)
  • AND
  • cpe:/h:netgear:wndr3700:v4:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.94)
  • AND
  • cpe:/h:netgear:wndr4300:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.50)
  • AND
  • cpe:/h:netgear:wndr4300:v2:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.50)
  • AND
  • cpe:/h:netgear:wndr4500:v3:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.62)
  • AND
  • cpe:/h:netgear:wnr2000:v5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:netgear:r7800_firmware:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wndr3700v4_firmware:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wndr4300_firmware:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:d6100_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wndr4300v2_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wnr2000v5_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wndr4500v3_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:r6100_firmware:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:r9000_firmware:1.0.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netgear d6100 firmware *
    netgear d6100 -
    netgear r6100 firmware *
    netgear r6100 -
    netgear r7800 firmware *
    netgear r7800 -
    netgear r9000 firmware *
    netgear r9000 -
    netgear wndr3700 firmware *
    netgear wndr3700 v4
    netgear wndr4300 firmware *
    netgear wndr4300 -
    netgear wndr4300 firmware *
    netgear wndr4300 v2
    netgear wndr4500 firmware *
    netgear wndr4500 v3
    netgear wnr2000 firmware *
    netgear wnr2000 v5
    netgear r7800 firmware 1.0.2
    netgear wndr3700v4 firmware 1.0.2
    netgear wndr4300 firmware 1.0.2
    netgear d6100 firmware 1.0.0
    netgear wndr4300v2 firmware 1.0.0
    netgear wnr2000v5 firmware 1.0.0
    netgear wndr4500v3 firmware 1.0.0
    netgear r6100 firmware 1.0.1
    netgear r9000 firmware 1.0.2