VAR-202102-0343
Vulnerability from variot - Updated: 2024-11-23 22:37This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from improper state tracking in the password recovery process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11365. NETGEAR R7450 A router contains a vulnerability related to the leakage of resources to the wrong area. Zero Day Initiative To this vulnerability ZDI-CAN-11365 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR R7450 is a router from Netgear. A hardware device that connects two or more networks and acts as a gateway between the networks
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "r6260",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.1.0.78"
},
{
"_id": null,
"model": "r7450",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "ac2100",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "ac2400",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "r6020",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.0.0.48"
},
{
"_id": null,
"model": "r6080",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.0.0.48"
},
{
"_id": null,
"model": "r6800",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "r6850",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.1.0.78"
},
{
"_id": null,
"model": "r7200",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "r7350",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "r7400",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "ac2600",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "r6350",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.1.0.78"
},
{
"_id": null,
"model": "r6330",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.1.0.78"
},
{
"_id": null,
"model": "r6700",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "r6900",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.2.0.76"
},
{
"_id": null,
"model": "r6220",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.1.0.104"
},
{
"_id": null,
"model": "r6230",
"scope": "lt",
"trust": 1.6,
"vendor": "netgear",
"version": "1.1.0.104"
},
{
"_id": null,
"model": "r6120",
"scope": "lt",
"trust": 1.0,
"vendor": "netgear",
"version": "1.0.0.76"
},
{
"_id": null,
"model": "ac2100",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "r7400",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "r7200",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "r6900",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "ac2400",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "ac2600",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "r7450",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "r6800",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "r7350",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "r6700",
"scope": null,
"trust": 0.8,
"vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2",
"version": null
},
{
"_id": null,
"model": "r7450",
"scope": null,
"trust": 0.7,
"vendor": "netgear",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-071"
},
{
"db": "CNVD",
"id": "CNVD-2022-06704"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015834"
},
{
"db": "NVD",
"id": "CVE-2020-27872"
}
]
},
"credits": {
"_id": null,
"data": "1sd3d of Viettel Cyber Security",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-071"
}
],
"trust": 0.7
},
"cve": "CVE-2020-27872",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.5,
"id": "CVE-2020-27872",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.5,
"id": "CNVD-2022-06704",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "zdi-disclosures@trendmicro.com",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-27872",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-27872",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-27872",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "NONE",
"vectorString": "AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-27872",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "zdi-disclosures@trendmicro.com",
"id": "CVE-2020-27872",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-27872",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-27872",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2022-06704",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-385",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-27872",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-071"
},
{
"db": "CNVD",
"id": "CNVD-2022-06704"
},
{
"db": "VULMON",
"id": "CVE-2020-27872"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015834"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-385"
},
{
"db": "NVD",
"id": "CVE-2020-27872"
},
{
"db": "NVD",
"id": "CVE-2020-27872"
}
]
},
"description": {
"_id": null,
"data": "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from improper state tracking in the password recovery process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11365. NETGEAR R7450 A router contains a vulnerability related to the leakage of resources to the wrong area. Zero Day Initiative To this vulnerability ZDI-CAN-11365 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. NETGEAR R7450 is a router from Netgear. A hardware device that connects two or more networks and acts as a gateway between the networks",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-27872"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015834"
},
{
"db": "ZDI",
"id": "ZDI-21-071"
},
{
"db": "CNVD",
"id": "CNVD-2022-06704"
},
{
"db": "VULMON",
"id": "CVE-2020-27872"
}
],
"trust": 2.88
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-27872",
"trust": 3.8
},
{
"db": "ZDI",
"id": "ZDI-21-071",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015834",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11365",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2022-06704",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-385",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2020-27872",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-071"
},
{
"db": "CNVD",
"id": "CNVD-2022-06704"
},
{
"db": "VULMON",
"id": "CVE-2020-27872"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015834"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-385"
},
{
"db": "NVD",
"id": "CVE-2020-27872"
}
]
},
"id": "VAR-202102-0343",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-06704"
}
],
"trust": 0.9393898425
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-06704"
}
]
},
"last_update_date": "2024-11-23T22:37:05.259000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Security\u00a0Advisory\u00a0for\u00a0Password\u00a0Recovery\u00a0Vulnerabilities\u00a0on\u00a0Some\u00a0Routers",
"trust": 1.5,
"url": "https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers"
},
{
"title": "Patch for NETGEAR R7450 Authentication Bypass Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/316191"
},
{
"title": "NETGEAR R7450 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=140609"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-071"
},
{
"db": "CNVD",
"id": "CNVD-2022-06704"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015834"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-385"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-642",
"trust": 1.0
},
{
"problemtype": "CWE-668",
"trust": 1.0
},
{
"problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015834"
},
{
"db": "NVD",
"id": "CVE-2020-27872"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.4,
"url": "https://kb.netgear.com/000062641/security-advisory-for-password-recovery-vulnerabilities-on-some-routers"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-27872"
},
{
"trust": 1.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-071/"
},
{
"trust": 0.8,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-071//"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/668.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-071"
},
{
"db": "CNVD",
"id": "CNVD-2022-06704"
},
{
"db": "VULMON",
"id": "CVE-2020-27872"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015834"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-385"
},
{
"db": "NVD",
"id": "CVE-2020-27872"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-071",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2022-06704",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2020-27872",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2020-015834",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202102-385",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-27872",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-01-18T00:00:00",
"db": "ZDI",
"id": "ZDI-21-071",
"ident": null
},
{
"date": "2022-01-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-06704",
"ident": null
},
{
"date": "2021-02-04T00:00:00",
"db": "VULMON",
"id": "CVE-2020-27872",
"ident": null
},
{
"date": "2021-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-015834",
"ident": null
},
{
"date": "2021-02-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-385",
"ident": null
},
{
"date": "2021-02-04T17:15:13.293000",
"db": "NVD",
"id": "CVE-2020-27872",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-01-18T00:00:00",
"db": "ZDI",
"id": "ZDI-21-071",
"ident": null
},
{
"date": "2022-01-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-06704",
"ident": null
},
{
"date": "2021-02-08T00:00:00",
"db": "VULMON",
"id": "CVE-2020-27872",
"ident": null
},
{
"date": "2021-10-19T07:03:00",
"db": "JVNDB",
"id": "JVNDB-2020-015834",
"ident": null
},
{
"date": "2021-02-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-385",
"ident": null
},
{
"date": "2024-11-21T05:21:58.533000",
"db": "NVD",
"id": "CVE-2020-27872",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote or local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-385"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "NETGEAR\u00a0R7450\u00a0 Vulnerability in leaking resources to incorrect area in router",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-015834"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-385"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.