9.3

CVE-2021-40847

Exploit

The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by default. This daemon connects to Circle and NETGEAR to obtain version information and updates to the circled daemon and its filtering database. However, database updates from NETGEAR are unsigned and downloaded via cleartext HTTP. As such, an attacker with the ability to perform a MitM attack on the device can respond to circled update requests with a crafted, compressed database file, the extraction of which gives the attacker the ability to overwrite executable files with attacker-controlled code. This affects R6400v2 1.0.4.106, R6700 1.0.2.16, R6700v3 1.0.4.106, R6900 1.0.2.16, R6900P 1.3.2.134, R7000 1.0.11.123, R7000P 1.3.2.134, R7850 1.0.5.68, R7900 1.0.4.38, R8000 1.0.4.68, and RS400 1.5.0.68.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NetgearR6400v2 Firmware Version1.0.4.106
   NetgearR6400v2 Version-
NetgearR6700 Firmware Version1.0.2.16
   NetgearR6700 Version-
NetgearR6700v3 Firmware Version1.0.4.106
   NetgearR6700v3 Version-
NetgearR6900 Firmware Version1.0.2.16
   NetgearR6900 Version-
NetgearR6900p Firmware Version1.3.2.134
   NetgearR6900p Version-
NetgearR7000 Firmware Version1.0.11.123
   NetgearR7000 Version-
NetgearR7000p Firmware Version1.3.2.134
   NetgearR7000p Version-
NetgearR7850 Firmware Version1.0.5.68
   NetgearR7850 Version-
NetgearR7900 Firmware Version1.0.4.38
   NetgearR7900 Version-
NetgearR8000 Firmware Version1.0.4.68
   NetgearR8000 Version-
NetgearRs400 Firmware Version1.5.0.68
   NetgearRs400 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 6.13% 0.898
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.2 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-319 Cleartext Transmission of Sensitive Information

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.