Vulnerability Name:

CVE-2021-45556 (CCN-216008)

Assigned:2021-12-22
Published:2021-12-22
Updated:2022-01-10
Summary:Certain NETGEAR devices are affected by command injection by an authenticated user. This affects GS108Tv2 before 5.4.2.36, GS110TPP before 7.0.7.2, GS110TPv2 before 5.4.2.36., GS110TPv3 before 7.0.7.2, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:H)
7.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.4 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:S/C:P/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-77
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-45556

Source: XF
Type: UNKNOWN
netgear-psv20210175-cmd-exec(216008)

Source: MISC
Type: Patch, Vendor Advisory
https://kb.netgear.com/000064534/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Smart-Managed-Pro-Switches-PSV-2021-0175

Source: CCN
Type: NETGEAR Security Advisory: PSV-2021-0175
Security Advisory for Post-Authentication Command Injection on Some Smart Managed Pro Switches

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netgear:gs108tv2_firmware:*:*:*:*:*:*:*:* (Version < 5.4.2.36)
  • AND
  • cpe:/h:netgear:gs108tv2:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:* (Version < 7.0.7.2)
  • AND
  • cpe:/h:netgear:gs110tpp:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:netgear:gs110tpv2_firmware:*:*:*:*:*:*:*:* (Version < 5.4.2.36)
  • AND
  • cpe:/h:netgear:gs110tpv2:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:netgear:gs308t_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.2)
  • AND
  • cpe:/h:netgear:gs308t:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:netgear:gs110tpv3_firmware:*:*:*:*:*:*:*:* (Version < 7.0.7.2)
  • AND
  • cpe:/h:netgear:gs110tpv3:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:netgear:gs310tp_firmware:*:*:*:*:*:*:*:* (Version < 1.0.3.2)
  • AND
  • cpe:/h:netgear:gs310tp:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:* (Version < 2.0.6.3)
  • AND
  • cpe:/h:netgear:gs724tpp:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:netgear:gs724tpv2_firmware:*:*:*:*:*:*:*:* (Version < 2.0.6.3)
  • AND
  • cpe:/h:netgear:gs724tpv2:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:netgear:gs728tppv2_firmware:*:*:*:*:*:*:*:* (Version < 6.0.8.2)
  • AND
  • cpe:/h:netgear:gs728tppv2:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:netgear:gs728tpv2_firmware:*:*:*:*:*:*:*:* (Version < 6.0.8.2)
  • AND
  • cpe:/h:netgear:gs728tpv2:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:* (Version < 6.0.8.2)
  • AND
  • cpe:/h:netgear:gs752tpp:-:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:netgear:gs752tpv2_firmware:*:*:*:*:*:*:*:* (Version < 6.0.8.2)
  • AND
  • cpe:/h:netgear:gs752tpv2:-:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:* (Version < 1.0.4.2)
  • AND
  • cpe:/h:netgear:ms510txm:-:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:* (Version < 1.0.4.2)
  • AND
  • cpe:/h:netgear:ms510txup:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:netgear:gs110tp:v3:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:gs724tpp:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:gs724tp:v2:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:gs728tpp:v2:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:gs110tpp:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:gs308t:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:gs310tp:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:gs108t:v2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netgear gs108tv2 firmware *
    netgear gs108tv2 -
    netgear gs110tpp firmware *
    netgear gs110tpp -
    netgear gs110tpv2 firmware *
    netgear gs110tpv2 -
    netgear gs308t firmware *
    netgear gs308t -
    netgear gs110tpv3 firmware *
    netgear gs110tpv3 -
    netgear gs310tp firmware *
    netgear gs310tp -
    netgear gs724tpp firmware *
    netgear gs724tpp -
    netgear gs724tpv2 firmware *
    netgear gs724tpv2 -
    netgear gs728tppv2 firmware *
    netgear gs728tppv2 -
    netgear gs728tpv2 firmware *
    netgear gs728tpv2 -
    netgear gs752tpp firmware *
    netgear gs752tpp -
    netgear gs752tpv2 firmware *
    netgear gs752tpv2 -
    netgear ms510txm firmware *
    netgear ms510txm -
    netgear ms510txup firmware *
    netgear ms510txup -
    netgear gs110tp v3
    netgear gs724tpp -
    netgear gs724tp v2
    netgear gs728tpp v2
    netgear gs110tpp -
    netgear gs308t -
    netgear gs310tp -
    netgear gs108t v2