VAR-201312-0127

Vulnerability from variot - Updated: 2025-04-11 23:11

NETGEAR ProSafe GS724Tv3 and GS716Tv2 with firmware 5.4.1.13 and earlier, GS748Tv4 5.4.1.14, and GS510TP 5.0.4.4 allows remote attackers to cause a denial of service (reboot or crash) via a crafted HTTP request to filesystem/. NetGear ProSafe is a smart switch product that monitors and configures the network. Successfully exploiting this issue allows remote attackers to cause denial-of-service conditions. The following ProSafe products are vulnerable: GS724Tv3 firmware version 5.4.1.13 GS716Tv2 firmware version 5.4.1.13 GS724Tv3 firmware version 5.4.1.10 GS716Tv2 firmware version 5.4.1.10 GS748Tv4 firmware version 5.4.1.14 GS510TP firmware version 5.0.4.4. 1. BACKGROUND

According to the vendor, Netgear ProSafe is a cost-effective line of smart switches for Small and Medium Businesses (SMBs). The products cover an essential set of network features and easy-to-use web-based management. Power over Ethernet (PoE) and Stacking versions are also available.

  1. SUMMARY

A range of ProSafe switches are affected by two different vulnerabilities: CVE-2013-4775: Unauthenticated startup-config disclosure. CVE-2013-4776: Denial of Service vulnerability.

  1. VULNERABILITIES

The list below describes the vulnerabilities discovered in the affected software.

4.1 CVE-2013-4775: Unauthenticated startup-config disclosure

The web management application fails to restrict URL access to different application areas.

[Proof of Concept] The vulnerability can be exploited with a simple HTTP (GET) request. Open a browser and visit http://Target-IP/filesystem/startup-config

4.2 CVE-2013-4776: Denial of Service vulnerability

The affected products are prone to a Denial of Service vulnerability.

[Proof of Concept] The vulnerability can be exploited with a simple HTTP (GET) request. Open a browser and visit http://Target-IP/filesystem/

Implementation of a Proof of Concept for both vulnerabilities can be found here: http://www.encripto.no/tools/netgear-prosafe-PoC.tar.gz

  1. REMEDIATION

No firmware updates or fixes have been released yet. As a mitigation, the vendor recommends configuring a separate management VLAN and configure access control via \x93Security::Access::Access Control\x94 or \x93Security::ACL::Advanced::IP Extended Rules\x94.

  1. CREDIT

The vulnerabilities were originally discovered in a GS724Tv3 device, by Juan J. G\xfcelfo at Encripto AS. E-mail: post [at] encripto [dot] no Web: http://www.encripto.no

Special thanks to Maarten Hoogcarspel and the Netgear Support Team for verifying other switch models, and considering possible fixes.

For more information about Encripto\x92s research policy, please visit http://www.encripto.no/forskning/

  1. REFERENCES

http://www.encripto.no/forskning/whitepapers/Netgear_prosafe_advisory_aug_2013.pdf http://www.encripto.no/tools/netgear-prosafe-PoC.tar.gz

DISCLAIMER

The material presented in this document is for educational purposes only. Encripto AS cannot be responsible for any loss or damage carried out by any technique presented in this material. The reader is the only one responsible for applying this knowledge, which is at his / her own risk. Any of the trademarks, service marks, collective marks, design rights, personality rights or similar rights that are mentioned, used or cited in this document is property of their respective owners

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0127",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "prosafe",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "netgear",
        "version": "5.4.1.14"
      },
      {
        "model": "prosafe",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "netgear",
        "version": "5.3.0.17"
      },
      {
        "model": "prosafe",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "netgear",
        "version": "5.4.1.10"
      },
      {
        "model": "prosafe",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "netgear",
        "version": "5.0.4.4"
      },
      {
        "model": "prosafe",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "netgear",
        "version": "5.4.0.6"
      },
      {
        "model": "prosafe gs748t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netgear",
        "version": "v4"
      },
      {
        "model": "prosafe gs510tp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": "prosafe",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "netgear",
        "version": "5.4.1.13"
      },
      {
        "model": "prosafe gs724t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netgear",
        "version": "v3"
      },
      {
        "model": "prosafe s716t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netgear",
        "version": "v2"
      },
      {
        "model": "gs510tp",
        "scope": null,
        "trust": 0.8,
        "vendor": "net gear",
        "version": null
      },
      {
        "model": "gs716t",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "net gear",
        "version": "v2"
      },
      {
        "model": "gs724t",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "net gear",
        "version": "v3"
      },
      {
        "model": "gs748t",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "net gear",
        "version": "v4"
      },
      {
        "model": "prosafe",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "net gear",
        "version": "5.0.4.4 (gs510tp)"
      },
      {
        "model": "prosafe",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "net gear",
        "version": "5.4.1.13   (gs716t v2)"
      },
      {
        "model": "prosafe",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "net gear",
        "version": "5.4.1.13   (gs724t v3)"
      },
      {
        "model": "prosafe",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "net gear",
        "version": "5.4.1.14 (gs748t v4)"
      },
      {
        "model": "prosafe switches",
        "scope": null,
        "trust": 0.6,
        "vendor": "netgear",
        "version": null
      },
      {
        "model": "prosafe",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "netgear",
        "version": "5.4.1.13"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-397"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4776"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:netgear:prosafe_gs510tp",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:netgear:prosafe_gs716t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:netgear:prosafe_gs724t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:netgear:prosafe_gs748t",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:netgear:prosafe_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Juan J. G\u00fcelfo of Encripto AS",
    "sources": [
      {
        "db": "BID",
        "id": "61924"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-4776",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-4776",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-12566",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-64778",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-4776",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-4776",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-12566",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201312-397",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64778",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64778"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-397"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4776"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "NETGEAR ProSafe GS724Tv3 and GS716Tv2 with firmware 5.4.1.13 and earlier, GS748Tv4 5.4.1.14, and GS510TP 5.0.4.4 allows remote attackers to cause a denial of service (reboot or crash) via a crafted HTTP request to filesystem/. NetGear ProSafe is a smart switch product that monitors and configures the network. \nSuccessfully exploiting this issue allows remote attackers to cause denial-of-service conditions. \nThe following ProSafe products are vulnerable:\nGS724Tv3 firmware version 5.4.1.13\nGS716Tv2 firmware version 5.4.1.13\nGS724Tv3 firmware version 5.4.1.10\nGS716Tv2 firmware version 5.4.1.10\nGS748Tv4 firmware version 5.4.1.14\nGS510TP firmware version 5.0.4.4. 1. BACKGROUND\n\nAccording to the vendor, Netgear ProSafe is a cost-effective line of smart switches for Small and Medium Businesses (SMBs). The products cover an essential set of network features and easy-to-use web-based management. Power over Ethernet (PoE) and Stacking versions are also available. \n\n\n2. SUMMARY\n\nA range of ProSafe switches are affected by two different vulnerabilities:\nCVE-2013-4775: Unauthenticated startup-config disclosure. \nCVE-2013-4776: Denial of Service vulnerability. \n\n\n3. VULNERABILITIES\n\nThe list below describes the vulnerabilities discovered in the affected software. \n\n\n4.1 CVE-2013-4775: Unauthenticated startup-config disclosure\n\nThe web management application fails to restrict URL access to different application areas. \n\n[Proof of Concept]\nThe vulnerability can be exploited with a simple HTTP (GET) request. \nOpen a browser and visit http://Target-IP/filesystem/startup-config\n\n\n4.2 CVE-2013-4776: Denial of Service vulnerability\n\nThe affected products are prone to a Denial of Service vulnerability. \n\n[Proof of Concept]\nThe vulnerability can be exploited with a simple HTTP (GET) request. \nOpen a browser and visit http://Target-IP/filesystem/\n\n\nImplementation of a Proof of Concept for both vulnerabilities can be found here:\nhttp://www.encripto.no/tools/netgear-prosafe-PoC.tar.gz\n\n\n5. REMEDIATION\n\nNo firmware updates or fixes have been released yet. \nAs a mitigation, the vendor recommends configuring a separate management VLAN and configure\naccess control via \\x93Security::Access::Access Control\\x94 or \\x93Security::ACL::Advanced::IP Extended Rules\\x94. \n\n\n6. CREDIT\n\nThe vulnerabilities were originally discovered in a GS724Tv3 device, by Juan J. G\\xfcelfo at Encripto AS. \nE-mail: post [at] encripto [dot] no\nWeb: http://www.encripto.no\n\n\nSpecial thanks to Maarten Hoogcarspel and the Netgear Support Team for verifying other switch\nmodels, and considering possible fixes. \n\nFor more information about Encripto\\x92s research policy, please visit http://www.encripto.no/forskning/\n\n\n7. REFERENCES\n\nhttp://www.encripto.no/forskning/whitepapers/Netgear_prosafe_advisory_aug_2013.pdf\nhttp://www.encripto.no/tools/netgear-prosafe-PoC.tar.gz\n\n \nDISCLAIMER\n\nThe material presented in this document is for educational purposes only. Encripto AS cannot be\nresponsible for any loss or damage carried out by any technique presented in this material. The reader is\nthe only one responsible for applying this knowledge, which is at his / her own risk. \nAny of the trademarks, service marks, collective marks, design rights, personality rights or similar rights\nthat are mentioned, used or cited in this document is property of their respective owners",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4776"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "db": "BID",
        "id": "61924"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64778"
      },
      {
        "db": "PACKETSTORM",
        "id": "122904"
      }
    ],
    "trust": 2.61
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-64778",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64778"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4776",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "61924",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-397",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-81367",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "27775",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-64778",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "122905",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "122904",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64778"
      },
      {
        "db": "BID",
        "id": "61924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      },
      {
        "db": "PACKETSTORM",
        "id": "122905"
      },
      {
        "db": "PACKETSTORM",
        "id": "122904"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-397"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4776"
      }
    ]
  },
  "id": "VAR-201312-0127",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64778"
      }
    ],
    "trust": 1.4177655666666666
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      }
    ]
  },
  "last_update_date": "2025-04-11T23:11:58.578000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u30b9\u30a4\u30c3\u30c1\u88fd\u54c1",
        "trust": 0.8,
        "url": "http://www.netgear.jp/products/business/switch"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4776"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.encripto.no/forskning/whitepapers/netgear_prosafe_advisory_aug_2013.pdf"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4776"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4776"
      },
      {
        "trust": 0.6,
        "url": "http://seclists.org/bugtraq/2013/aug/141"
      },
      {
        "trust": 0.3,
        "url": "http://www.netgear.com"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4775"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4776"
      },
      {
        "trust": 0.1,
        "url": "http://target-ip/filesystem/startup-config"
      },
      {
        "trust": 0.1,
        "url": "http://target-ip/filesystem/"
      },
      {
        "trust": 0.1,
        "url": "http://www.encripto.no/tools/netgear-prosafe-poc.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://www.encripto.no"
      },
      {
        "trust": 0.1,
        "url": "http://www.encripto.no/forskning/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64778"
      },
      {
        "db": "BID",
        "id": "61924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      },
      {
        "db": "PACKETSTORM",
        "id": "122905"
      },
      {
        "db": "PACKETSTORM",
        "id": "122904"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-397"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4776"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64778"
      },
      {
        "db": "BID",
        "id": "61924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      },
      {
        "db": "PACKETSTORM",
        "id": "122905"
      },
      {
        "db": "PACKETSTORM",
        "id": "122904"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-397"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4776"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-08-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64778"
      },
      {
        "date": "2013-08-21T00:00:00",
        "db": "BID",
        "id": "61924"
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      },
      {
        "date": "2013-08-22T02:13:52",
        "db": "PACKETSTORM",
        "id": "122905"
      },
      {
        "date": "2013-08-22T02:11:50",
        "db": "PACKETSTORM",
        "id": "122904"
      },
      {
        "date": "2013-12-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-397"
      },
      {
        "date": "2013-12-19T04:24:51.823000",
        "db": "NVD",
        "id": "CVE-2013-4776"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-08-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-12566"
      },
      {
        "date": "2013-12-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64778"
      },
      {
        "date": "2013-08-21T00:00:00",
        "db": "BID",
        "id": "61924"
      },
      {
        "date": "2013-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      },
      {
        "date": "2013-12-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201312-397"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2013-4776"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201312-397"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  NETGEAR ProSafe Service operation interruption in switch product firmware  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005622"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Failure to Handle Exceptional Conditions",
    "sources": [
      {
        "db": "BID",
        "id": "61924"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…