8.8
CVE-2021-45530
- EPSS 0.55%
- Published 26.12.2021 01:15:14
- Last modified 21.11.2024 06:32:26
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects R7000 before 1.0.11.126, R7960P before 1.4.2.84, R8000 before 1.0.4.74, RAX200 before 1.0.4.120, R8000P before 1.4.2.84, RAX20 before 1.0.2.82, RAX45 before 1.0.2.82, RAX80 before 1.0.4.120, R7900P before 1.4.2.84, RAX15 before 1.0.2.82, RAX50 before 1.0.2.82, and RAX75 before 1.0.4.120.
Data is provided by the National Vulnerability Database (NVD)
Netgear ≫ R7000 Firmware Version < 1.0.11.126
Netgear ≫ R7000p Firmware Version < 1.4.2.84
Netgear ≫ R7960p Firmware Version < 1.4.2.84
Netgear ≫ R8000 Firmware Version < 1.0.4.74
Netgear ≫ R8000p Firmware Version < 1.4.2.84
Netgear ≫ Rax20 Firmware Version < 1.0.2.82
Netgear ≫ Rax200 Firmware Version < 1.0.4.120
Netgear ≫ Rax45 Firmware Version < 1.0.2.82
Netgear ≫ Rax15 Firmware Version < 1.0.2.82
Netgear ≫ Rax75 Firmware Version < 1.0.4.120
Netgear ≫ Rax80 Firmware Version < 1.0.4.120
Netgear ≫ Rax50 Firmware Version < 1.0.2.82
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.55% | 0.652 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
cve@mitre.org | 4.5 | 0.9 | 3.6 |
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.