| Vulnerability Name: | CVE-2021-0179 (CCN-219055) | ||||||||||||
| Assigned: | 2020-10-22 | ||||||||||||
| Published: | 2022-02-08 | ||||||||||||
| Updated: | 2022-02-15 | ||||||||||||
| Summary: | Improper Use of Validation Framework in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | ||||||||||||
| CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-20 | ||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-0179 Source: XF Type: UNKNOWN intel-cve20210179-dos(219055) Source: CCN Type: Lenovo Security Advisory: LEN-62745 Intel PROSet Wireless Wi-Fi, Intel AMT Wireless and Killer Wi-Fi Software Advisory Source: CCN Type: INTEL-SA-00539 Intel PROSet/Wireless Wi-Fi, Intel AMT Wireless and Killer Wi-Fi Software Advisory Source: MISC Type: Vendor Advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration 7: Configuration 8: Configuration 9: Configuration 10: Configuration 11: Configuration 12: Configuration 13: Configuration 14: Configuration 15: Configuration 16: Configuration 17: Configuration 18: Configuration 19: Configuration 20: Configuration 21: Configuration 22: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| Vulnerability Name: | CVE-2021-0179 (CCN-250282) | ||||||||||||
| Assigned: | 2020-10-22 | ||||||||||||
| Published: | 2023-03-15 | ||||||||||||
| Updated: | 2023-03-15 | ||||||||||||
| Summary: | NETGEAR devices could allow a remote attacker to execute arbitrary commands on the system, caused by a command injection vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. | ||||||||||||
| CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||
| CVSS v2 Severity: | 3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-0179 Source: XF Type: UNKNOWN netgear-cve20210179-cmd-exec(250282) Source: CCN Type: NETGEAR Security Advisory: PSV-2021-0179 Security Advisory for Post-Authentication Command Injection on Some WiFi Systems Source: CCN Type: Netgear Web site Netgear | ||||||||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||