{"vulnerability": "CVE-2021-45608", "sightings": [{"uuid": "5de14406-072f-43d9-9055-233090744dd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45608", "type": "published-proof-of-concept", "source": "Telegram/wUlB9E53QnTwS4MeeBaQnMafV_06m7FBq_eaF4tSi9epjpEa", "content": "", "creation_timestamp": "2022-01-11T14:37:38.000000Z"}, {"uuid": "bfa85358-a3b9-47e3-8534-9f1927351bbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45608", "type": "published-proof-of-concept", "source": "Telegram/01eUotCa_MspLC9jLNdUeeDNUILndxenaEnguNKiI_CXzQ", "content": "", "creation_timestamp": "2022-01-12T09:14:50.000000Z"}, {"uuid": "bfa72c7b-dbd8-4baa-9fb4-dac2338bf4a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45608", "type": "published-proof-of-concept", "source": "Telegram/8itfmKtxjD1VOK4KWXahvsrjq_f9N0e49t_Q2iuDp0tC2A", "content": "", "creation_timestamp": "2022-01-11T16:00:28.000000Z"}, {"uuid": "8dc75218-5577-48db-9723-aa1d4067c894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45608", "type": "seen", "source": "https://t.me/linkersec/146", "content": "CVE-2021-45608: NetUSB RCE Flaw in Millions of End User Routers\n\nMax Van Amerongen published an analysis of a vulnerability in the NetUSB proprietary driver, which is used in products of many network device vendors.\n\nThe researcher briefly describes the exploitation strategy but does not share many details.", "creation_timestamp": "2022-01-14T21:00:02.000000Z"}, {"uuid": "52d7c513-63a0-4d48-893f-2107e536f611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45608", "type": "published-proof-of-concept", "source": "https://t.me/alexmakus/4501", "content": "\u041d\u0438\u043a\u043e\u0433\u0434\u0430 \u0442\u0430\u043a\u043e\u0433\u043e \u043d\u0435 \u0431\u044b\u043b\u043e \u0438 \u0432\u043e\u0442 \u043e\u043f\u044f\u0442\u044c - \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445 NetGear, TP-Link \u0438 \u0442\u0434. \u0414\u044b\u0440\u0430 \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 KCodes NetUSB, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0432 \u044f\u0434\u0440\u0435, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443, \u0432\u0435\u043d\u0434\u043e\u0440\u044b \u043f\u0430\u0442\u0447\u0430\u0442 \u0435\u0451 \u0441 \u043e\u043a\u0442\u044f\u0431\u0440\u044f, \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e \u043d\u0435 \u0431\u044b\u043b\u043e. \n\nhttps://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/", "creation_timestamp": "2022-04-20T21:56:04.000000Z"}, {"uuid": "ecfb1b61-0397-4db8-b11a-c7c439a282f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45608", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/611", "content": "CVE-2021-45608 | NetUSB RCE\nFlaw in Millions of End User Routers\nhttps://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers\n\nCVE-2021-42278 Domain Escalation - sAMAccountName\u00a0Spoofing\nhttps://pentestlab.blog/2022/01/10/domain-escalation-samaccountname-spoofing\n\nNew macOS vulnerability, \u201cpowerdir,\u201d could lead to unauthorized user data access\nhttps://www.microsoft.com/security/blog/2022/01/10/new-macos-vulnerability-powerdir-could-lead-to-unauthorized-user-data-access", "creation_timestamp": "2022-01-11T18:24:07.000000Z"}, {"uuid": "8acc745c-f64b-49ca-88aa-0642041beca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45608", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5185", "content": "#Threat_Research\n1. CVE-2021-45608 - NetUSB RCE Flaw in Millions of End User Routers\nhttps://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers\n2. APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit (CharmPower)\nhttps://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit\n3. Signed kernel drivers - \nUnguarded gateway to Windows\u2019 core...\nhttps://www.welivesecurity.com/2022/01/11/signed-kernel-drivers-unguarded-gateway-windows-core", "creation_timestamp": "2022-01-12T11:03:01.000000Z"}, {"uuid": "bc5cd184-5643-4c90-92d5-ff934d210bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45608", "type": "seen", "source": "https://t.me/zatelecom/20179", "content": "CVE-2021-45608 | \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c NetUSB RCE \u0432 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u0430\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439\n\nhttps://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/\n\n* SentinelLabs \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 \u044f\u0434\u0440\u0430 KCodes NetUSB, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u043c \u0431\u043e\u043b\u044c\u0448\u0438\u043c \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e\u043c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0435\u043c \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u044b \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n* \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0432 \u044f\u0434\u0440\u0435.\n* SentinelLabs \u043d\u0430\u0447\u0430\u043b\u0430 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 9 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f, \u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u044b\u043b\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430\u043c 4 \u043e\u043a\u0442\u044f\u0431\u0440\u044f.\n* \u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f SentinelOne \u043d\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0436\u0435\u0441\u0442\u043e\u043a\u043e\u0433\u043e \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435\n\n\u041d\u043e \u0442\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u0435 \u0441\u0432\u043e\u0438 \u0434\u043e\u043c\u0430\u0448\u043d\u0438\u0435 \u0431\u0430\u043b\u0430\u043b\u0430\u0439\u043a\u0438, \u0430 \u0438\u043c\u0435\u043d\u043d\u043e:\n* Netgear\n* TP-Link\n* Tenda\n* EDiMAX\n* DLink\n* Western Digital\n\nUPD: \u0438\u0437 DLink \u043d\u0430\u043f\u0438\u0441\u0430\u043b\u0438, \u0447\u0442\u043e \u043e\u043d\u0438 \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043c\u043e\u0434\u0443\u043b\u044c NetUSB \u0432 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445.", "creation_timestamp": "2022-01-13T10:35:48.000000Z"}]}