Vulnerability Name:

CVE-2019-20751 (CCN-180363)

Assigned:2019-05-30
Published:2019-05-30
Updated:2020-04-21
Summary:Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.60, DM200 before 1.0.0.61, EX2700 before 1.0.1.48, EX6100v2 before 1.0.1.76, EX6150v2 before 1.0.1.76, EX6200v2 before 1.0.1.72, EX8000 before 1.0.1.180, R7800 before 1.0.2.52, R8900 before 1.0.4.26, R9000 before 1.0.4.26, WN2000RPTv3 before 1.0.1.32, WN3000RPv2 before 1.0.0.68, WN3000RPv3 before 1.0.2.70, WN3100RPv2 before 1.0.0.66, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, and WNR2000v5 before 1.0.0.68.
CVSS v3 Severity:6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.2 Medium (CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.7 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2019-20751

Source: XF
Type: UNKNOWN
netgear-cve201920751-bo(180363)

Source: CCN
Type: NETGEAR Security Advisory: PSV-2018-0171
Security Advisory for Post-Authentication Stack Overflow on Some Extenders, Gateways, and Routers

Source: CONFIRM
Type: Vendor Advisory
https://kb.netgear.com/000060964/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Extenders-Gateways-and-Routers-PSV-2018-0171

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netgear:d6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.60)
  • AND
  • cpe:/h:netgear:d6100:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:netgear:dm200_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.61)
  • AND
  • cpe:/h:netgear:dm200:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:netgear:ex2700_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.48)
  • AND
  • cpe:/h:netgear:ex2700:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:netgear:ex6100_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.76)
  • AND
  • cpe:/h:netgear:ex6100:v2:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:netgear:ex6150_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.76)
  • AND
  • cpe:/h:netgear:ex6150:v2:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:netgear:ex6200_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.72)
  • AND
  • cpe:/h:netgear:ex6200:v2:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:netgear:ex8000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.180)
  • AND
  • cpe:/h:netgear:ex8000:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:netgear:r7800_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.52)
  • AND
  • cpe:/h:netgear:r7800:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:netgear:r8900_firmware:*:*:*:*:*:*:*:* (Version < 1.0.4.26)
  • AND
  • cpe:/h:netgear:r8900:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:netgear:r9000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.4.26)
  • AND
  • cpe:/h:netgear:r9000:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:netgear:wn2000rpt_firmware:*:*:*:*:*:*:*:* (Version < 1.0.1.32)
  • AND
  • cpe:/h:netgear:wn2000rpt:v3:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:netgear:wn3000rp_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.68)
  • AND
  • cpe:/h:netgear:wn3000rp:v2:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/o:netgear:wn3000rp_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.70)
  • AND
  • cpe:/h:netgear:wn3000rp:v3:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:netgear:wn3100rp_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.66)
  • AND
  • cpe:/h:netgear:wn3100rp:v2:*:*:*:*:*:*:*

  • Configuration 15:
  • cpe:/o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.58)
  • AND
  • cpe:/h:netgear:wndr4300:v2:*:*:*:*:*:*:*

  • Configuration 16:
  • cpe:/o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.58)
  • AND
  • cpe:/h:netgear:wndr4500:v3:*:*:*:*:*:*:*

  • Configuration 17:
  • cpe:/o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.0.68)
  • AND
  • cpe:/h:netgear:wnr2000:v5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:netgear:r7800_firmware:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:r9000_firmware:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:r8900_firmware:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:d6100_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wndr4300v2_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wnr2000v5_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wndr4500v3_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:ex8000_firmware:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wn3000rpv2_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:ex6200v2_firmware:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wn2000rptv3_firmware:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:ex6100v2_firmware:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:dm200_firmware:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:ex6150v2_firmware:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:ex2700_firmware:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wn3000rpv3_firmware:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:netgear:wn3100rpv2_firmware:1.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netgear d6100 firmware *
    netgear d6100 -
    netgear dm200 firmware *
    netgear dm200 -
    netgear ex2700 firmware *
    netgear ex2700 -
    netgear ex6100 firmware *
    netgear ex6100 v2
    netgear ex6150 firmware *
    netgear ex6150 v2
    netgear ex6200 firmware *
    netgear ex6200 v2
    netgear ex8000 firmware *
    netgear ex8000 -
    netgear r7800 firmware *
    netgear r7800 -
    netgear r8900 firmware *
    netgear r8900 -
    netgear r9000 firmware *
    netgear r9000 -
    netgear wn2000rpt firmware *
    netgear wn2000rpt v3
    netgear wn3000rp firmware *
    netgear wn3000rp v2
    netgear wn3000rp firmware *
    netgear wn3000rp v3
    netgear wn3100rp firmware *
    netgear wn3100rp v2
    netgear wndr4300 firmware *
    netgear wndr4300 v2
    netgear wndr4500 firmware *
    netgear wndr4500 v3
    netgear wnr2000 firmware *
    netgear wnr2000 v5
    netgear r7800 firmware 1.0.2
    netgear r9000 firmware 1.0.4
    netgear r8900 firmware 1.0.4
    netgear d6100 firmware 1.0.0
    netgear wndr4300v2 firmware 1.0.0
    netgear wnr2000v5 firmware 1.0.0
    netgear wndr4500v3 firmware 1.0.0
    netgear ex8000 firmware 1.0.1
    netgear wn3000rpv2 firmware 1.0.0
    netgear ex6200v2 firmware 1.0.1
    netgear wn2000rptv3 firmware 1.0.1
    netgear ex6100v2 firmware 1.0.1
    netgear dm200 firmware 1.0.0
    netgear ex6150v2 firmware 1.0.1
    netgear ex2700 firmware 1.0.1
    netgear wn3000rpv3 firmware 1.0.2
    netgear wn3100rpv2 firmware 1.0.0