VAR-202007-0056

Vulnerability from variot - Updated: 2024-11-23 22:44

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of URLs. The issue results from the lack of proper routing of URLs. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-9618. NETGEAR R6700 A router contains an access control vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-9618 Was numbered.Information may be obtained

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "r6700",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "netgear",
        "version": "1.0.4.84_10.0.58"
      },
      {
        "_id": null,
        "model": "r6700",
        "scope": null,
        "trust": 0.7,
        "vendor": "netgear",
        "version": null
      },
      {
        "_id": null,
        "model": "r6700 v1.0.4.84 10.0.58",
        "scope": null,
        "trust": 0.6,
        "vendor": "netgear",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-711"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10930"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:netgear:r6700_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "d4rkn3ss from VNPT ISC",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-711"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2020-10930",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CVE-2020-10930",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.0,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 3.3,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-008852",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.5,
            "id": "CNVD-2020-43620",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2020-10930",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "zdi-disclosures@trendmicro.com",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2020-10930",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Adjacent Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2020-008852",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT",
            "author": "ZDI",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "ZDI-20-711",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "NONE",
            "vectorString": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-10930",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "zdi-disclosures@trendmicro.com",
            "id": "CVE-2020-10930",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "JVNDB-2020-008852",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "ZDI-20-711",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2020-43620",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202007-1650",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-711"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-1650"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10930"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10930"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of URLs. The issue results from the lack of proper routing of URLs. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-9618. NETGEAR R6700 A router contains an access control vulnerability. Zero Day Initiative To this vulnerability ZDI-CAN-9618 Was numbered.Information may be obtained",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-10930"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      },
      {
        "db": "ZDI",
        "id": "ZDI-20-711"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-20-711",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10930",
        "trust": 3.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9618",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-1650",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-20-711"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-1650"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10930"
      }
    ]
  },
  "id": "VAR-202007-0056",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620"
      }
    ],
    "trust": 1.4180177333333333
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:44:29.539000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.netgear.com/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-284",
        "trust": 1.8
      },
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10930"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.0,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-20-711/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10930"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10930"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-1650"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10930"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-20-711",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2020-43620",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-1650",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2020-10930",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2020-06-15T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-711",
        "ident": null
      },
      {
        "date": "2020-07-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-43620",
        "ident": null
      },
      {
        "date": "2020-09-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-008852",
        "ident": null
      },
      {
        "date": "2020-07-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202007-1650",
        "ident": null
      },
      {
        "date": "2020-07-28T18:15:14.160000",
        "db": "NVD",
        "id": "CVE-2020-10930",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2020-06-15T00:00:00",
        "db": "ZDI",
        "id": "ZDI-20-711",
        "ident": null
      },
      {
        "date": "2020-07-31T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2020-43620",
        "ident": null
      },
      {
        "date": "2020-09-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2020-008852",
        "ident": null
      },
      {
        "date": "2022-07-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202007-1650",
        "ident": null
      },
      {
        "date": "2024-11-21T04:56:23.563000",
        "db": "NVD",
        "id": "CVE-2020-10930",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote or local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-1650"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "NETGEAR R6700 Access control vulnerabilities in routers",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2020-008852"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202007-1650"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…