Description
Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-7632 | Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2021-57 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-03T17:30:07.419Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20175
No data.
Status : Modified
Published: 2021-12-30T22:15:09.857
Modified: 2024-11-21T05:46:04.160
Link: CVE-2021-20175
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD