Link | Resource |
---|---|
https://kb.netgear.com/000064118/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-and-Extenders-PSV-2020-0184 | Patch Vendor Advisory |
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
Configuration 23 (hide)
AND |
|
Configuration 24 (hide)
AND |
|
Configuration 25 (hide)
AND |
|
Configuration 26 (hide)
AND |
|
Configuration 27 (hide)
AND |
|
Configuration 28 (hide)
AND |
|
Configuration 29 (hide)
AND |
|
Configuration 30 (hide)
AND |
|
Configuration 31 (hide)
AND |
|
Configuration 32 (hide)
AND |
|
Configuration 33 (hide)
AND |
|
Configuration 34 (hide)
AND |
|
10 Jan 2022, 15:23
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-200 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) https://kb.netgear.com/000064118/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-and-Extenders-PSV-2020-0184 - Patch, Vendor Advisory | |
CPE | cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7350:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7200:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6330:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:ac2600:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6230_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6850_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:eax80:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6230:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:ac2100:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6350_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7400_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:ac2400:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:eax80_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7400:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6330_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6220_firmware:1.1.0.110:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6350:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7350_firmware:*:*:*:*:*:*:*:* |
26 Dec 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2021-12-26 01:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-45647
Mitre link : CVE-2021-45647
CVE.ORG link : CVE-2021-45647
JSON object : View
netgear
- r7900_firmware
- ac2600_firmware
- r7450
- rax75
- r6230_firmware
- r6260
- r7960p_firmware
- ac2400_firmware
- r6350
- rax200
- rax80
- r7000p_firmware
- ex7000
- r6800
- r7000
- r7900
- rax20
- rax50
- r7000p
- r6120_firmware
- r6850
- r6900p_firmware
- ac2400
- r7900p
- r8000_firmware
- r6700v2_firmware
- rax50_firmware
- r8000p_firmware
- r6220
- eax80
- r6330
- r6900v2
- r6800_firmware
- r7400_firmware
- r6850_firmware
- ac2100_firmware
- r7350_firmware
- r6230
- ac2600
- r6120
- r6220_firmware
- r7900p_firmware
- r7960p
- r8000p
- r7200_firmware
- r7450_firmware
- ac2100
- r7000_firmware
- r6330_firmware
- r8000
- r7400
- rax45
- rax80_firmware
- r6700v2
- rax200_firmware
- eax80_firmware
- r6350_firmware
- r7200
- rax20_firmware
- rax75_firmware
- r6260_firmware
- rax15_firmware
- rax15
- r7350
- r6900p
- rax45_firmware
- ex7000_firmware
- r6900v2_firmware
Exposure of Sensitive Information to an Unauthorized Actor