CVE-2021-20171

Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
References
Link Resource
https://www.tenable.com/security/research/tra-2021-55 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:rax43_firmware:1.0.3.96:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*

History

11 Jan 2022, 14:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5
References (MISC) https://www.tenable.com/security/research/tra-2021-55 - (MISC) https://www.tenable.com/security/research/tra-2021-55 - Third Party Advisory
CWE CWE-312
CPE cpe:2.3:o:netgear:rax43_firmware:1.0.3.96:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*

30 Dec 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-30 22:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-20171

Mitre link : CVE-2021-20171

CVE.ORG link : CVE-2021-20171


JSON object : View

Products Affected

netgear

  • rax43_firmware
  • rax43
CWE
CWE-312

Cleartext Storage of Sensitive Information