Vulnerability Name:

CVE-2021-45539 (CCN-215922)

Assigned:2021-12-21
Published:2021-12-21
Updated:2022-01-06
Summary:Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.28, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.28, and RAX75 before 1.0.3.106.
CVSS v3 Severity:6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.2 Medium (CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.7 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-77
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-45539

Source: XF
Type: UNKNOWN
netgear-psv20200195-cmd-exec(215922)

Source: MISC
Type: Patch, Vendor Advisory
https://kb.netgear.com/000064476/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0195

Source: CCN
Type: NETGEAR Security Advisory: PSV-2020-0195
Security Advisory for Post-Authentication Command Injection on Some Routers and WiFi Systems

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netgear:r7900p_firmware:*:*:*:*:*:*:*:* (Version < 1.4.2.84)
  • AND
  • cpe:/h:netgear:r7900p:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:netgear:r7960p_firmware:*:*:*:*:*:*:*:* (Version < 1.4.2.84)
  • AND
  • cpe:/h:netgear:r7960p:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:netgear:r8000_firmware:*:*:*:*:*:*:*:* (Version < 1.0.4.74)
  • AND
  • cpe:/h:netgear:r8000:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:netgear:r8000p_firmware:*:*:*:*:*:*:*:* (Version < 1.4.2.84)
  • AND
  • cpe:/h:netgear:r8000p:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:netgear:mr60_firmware:*:*:*:*:*:*:*:* (Version < 1.0.6.110)
  • AND
  • cpe:/h:netgear:mr60:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:netgear:rax20_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.82)
  • AND
  • cpe:/h:netgear:rax20:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:netgear:rax45_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.28)
  • AND
  • cpe:/h:netgear:rax45:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:netgear:rax80_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.106)
  • AND
  • cpe:/h:netgear:rax80:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:netgear:rax15_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.82)
  • AND
  • cpe:/h:netgear:rax15:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:netgear:rax50_firmware:*:*:*:*:*:*:*:* (Version < 1.0.2.28)
  • AND
  • cpe:/h:netgear:rax50:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:netgear:rax75_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.106)
  • AND
  • cpe:/h:netgear:rax75:-:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:netgear:ms60_firmware:*:*:*:*:*:*:*:* (Version < 1.0.6.110)
  • AND
  • cpe:/h:netgear:ms60:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:netgear:r8000:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax40:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7960p:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax15:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax20:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax75:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax80:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r8000p:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7900p:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netgear r7900p firmware *
    netgear r7900p -
    netgear r7960p firmware *
    netgear r7960p -
    netgear r8000 firmware *
    netgear r8000 -
    netgear r8000p firmware *
    netgear r8000p -
    netgear mr60 firmware *
    netgear mr60 -
    netgear rax20 firmware *
    netgear rax20 -
    netgear rax45 firmware *
    netgear rax45 -
    netgear rax80 firmware *
    netgear rax80 -
    netgear rax15 firmware *
    netgear rax15 -
    netgear rax50 firmware *
    netgear rax50 -
    netgear rax75 firmware *
    netgear rax75 -
    netgear ms60 firmware *
    netgear ms60 -
    netgear r8000 -
    netgear rax40 -
    netgear r7960p -
    netgear rax15 -
    netgear rax20 -
    netgear rax75 -
    netgear rax80 -
    netgear r8000p -
    netgear r7900p -