← Retour aux CVEs
CVE-2017-18756
HIGH8.8
Description
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D6220 before 1.0.0.32, D6400 before 1.0.0.66, D8500 before 1.0.3.35, DGN2200Bv4 before 1.0.0.94, DGN2200v4 before 1.0.0.94, R6250 before 1.0.4.14, R6300v2 before 1.0.4.18, R6400 before 1.01.32, R6400v2 before 1.0.2.44, R6700 before 1.0.1.36, R6900 before 1.0.1.30, R6900P before 1.3.0.8, R7000 before 1.0.9.14, R7000P before 1.3.0.8, R7100LG before 1.0.0.34, R7900 before 1.0.2.4, R8000 before 1.0.4.2, WN2500RPv2 before 1.0.1.50, WNDR3400v3 before 1.0.1.14, and WNDR4000 before 1.0.2.10.
Details CVE
Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueADJACENT_NETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie4/22/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
netgear:d6220netgear:d6220_firmwarenetgear:d6400netgear:d6400_firmwarenetgear:d8500netgear:d8500_firmwarenetgear:dgn2200netgear:dgn2200_firmwarenetgear:dgn2200bnetgear:dgn2200b_firmwarenetgear:r6250netgear:r6250_firmwarenetgear:r6300netgear:r6300_firmwarenetgear:r6400netgear:r6400_firmwarenetgear:r6700netgear:r6700_firmwarenetgear:r6900netgear:r6900_firmwarenetgear:r6900pnetgear:r6900p_firmwarenetgear:r7000netgear:r7000_firmwarenetgear:r7000pnetgear:r7000p_firmwarenetgear:r7100lgnetgear:r7100lg_firmwarenetgear:r7900netgear:r7900_firmwarenetgear:r8000netgear:r8000_firmwarenetgear:wn2500rpnetgear:wn2500rp_firmwarenetgear:wndr3400netgear:wndr3400_firmwarenetgear:wndr4000netgear:wndr4000_firmware
References
https://kb.netgear.com/000051492/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2756(cve@mitre.org)
https://kb.netgear.com/000051492/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2756(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.