{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1CC9E5-8253-4924-8282-9E768661680E", "versionEndExcluding": "1.0.8.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E3ADD8-926C-46CD-ABDF-0F7C99879808", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B8389CE-DA82-49C9-A431-7B2FE7C8950E", "versionEndExcluding": "1.0.8.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79979EF-D425-4199-BC73-36FB97EA9976", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2C585B5-2EDE-41DD-A1DB-3F3B5DCB1C83", "versionEndExcluding": "7.0.7.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE9EB1F-D49E-499A-B39B-7F15A1E5DAEC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAAA5112-5735-4889-9F6C-4217D2CE58FC", "versionEndExcluding": "7.0.7.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs110tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E095D139-28EE-4ADD-8FCD-3C2322AC3668", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5F5E8A3-6FB6-45B0-819A-95F88B6486DD", "versionEndExcluding": "7.0.7.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*", "matchCriteriaId": "F2DA3649-BC53-496E-A78C-FFA471872B5A", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B241F5FC-3053-44ED-ABDE-F7E4C1F26E2D", "versionEndExcluding": "1.0.5.3", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs110tup:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A469DFA-DE46-444C-B007-F9932C61EE26", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs308t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5EF9D41-5E0D-4BBC-BD8C-40422B29D241", "versionEndExcluding": "1.0.3.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs308t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C204CFAA-0709-421A-A907-8F5B093063F4", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs310tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A18B9E4-16A6-443B-A504-784FA821B404", "versionEndExcluding": "1.0.3.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs310tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6761CCD9-9D27-465F-8707-F23707A84803", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17CEF560-AF2A-48AD-B8A4-666BD2ECBDCE", "versionEndExcluding": "1.0.5.3", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs710tup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F019BC-8BBB-40F4-A05C-172DCAC705C7", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E57F0167-9C61-44FB-A7BB-70F0A9247DB8", "versionEndExcluding": "1.0.4.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9D88DD2-CE3F-431C-8FC8-01CBFB5AFED1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "421B0F3A-9A03-42B0-8B45-E77DFE176A6F", "versionEndExcluding": "1.0.4.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB3B313-1667-401C-92CF-EBB03CF91010", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "339698F2-2727-469D-82E4-8E025FCBB106", "versionEndExcluding": "2.0.6.3", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs724tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EB10210-B401-4944-832A-D31AEA8B3952", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7710FD29-3D79-4260-875D-48BBC8B173BE", "versionEndExcluding": "2.0.6.3", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "E871CCB4-8093-44AE-B289-CF81F82A9DB8", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B67A12FE-8681-4789-896E-69B3E9057FE4", "versionEndExcluding": "6.0.8.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4DE9FB-CAD5-45F9-A11C-1C20EE2FF3A1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D623D8A0-ADEB-4476-9364-CFFAE4967784", "versionEndExcluding": "6.0.8.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "7126D4F8-2E3C-478B-9BD2-8055DFB48D8D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs750e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDFC5B41-EBAC-42C9-B12E-AAACC199F324", "versionEndExcluding": "1.0.1.10", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs750e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A56285CF-1BD8-4BB5-AC9C-9EDDFCFC9E5C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00504A9F-EBE8-4D88-98C6-52CC260EC944", "versionEndExcluding": "6.0.8.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs752tpp:-:*:*:*:*:*:*:*", "matchCriteriaId": "995D8E9F-7AE6-4A17-A728-7190FB2CE8BC", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F7E762-95AB-4E8F-865C-C29A6B41DC4F", "versionEndExcluding": "6.0.8.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*", "matchCriteriaId": "CDD4D404-9A22-408B-89CF-5107B809CB90", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D620D42-9365-4A5E-957C-ADB9EAD56D8C", "versionEndExcluding": "1.0.4.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CF12A57-ACFA-48AA-B41C-06EB7095C800", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD52B5A4-0CF4-4E80-BD9B-05C1DFB855D2", "versionEndExcluding": "1.0.4.2", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3A918F0-36BB-4EDE-98B8-00C3DC8F7BB5", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2."}, {"lang": "es", "value": "Determinados smart switches de NETGEAR est\u00e1n afectados por una vulnerabilidad de secuestro de autenticaci\u00f3n por parte de un atacante no autenticado que usa la misma direcci\u00f3n IP de origen que un administrador en el proceso de inicio de sesi\u00f3n (por ejemplo, detr\u00e1s del mismo dispositivo NAT, o ya en posesi\u00f3n de un punto de apoyo en la m\u00e1quina de un administrador). Esto ocurre porque el proceso de autenticaci\u00f3n HTTP de varios pasos est\u00e1 efectivamente ligado s\u00f3lo a la direcci\u00f3n IP de origen. Esto afecta a GC108P versiones anteriores a 1.0.8.2, GC108PP versiones anteriores a 1.0.8.2, GS108Tv3 versiones anteriores a 7.0.7.2, GS110TPP versiones anteriores a 7.0.7.2, GS110TPv3 versiones anteriores a 7. 0.7.2, GS110TUP versiones anteriores a 1.0.5.3, GS308T versiones anteriores a 1.0.3.2, GS310TP versiones anteriores a 1.0.3.2, GS710TUP versiones anteriores a 1.0.5.3, GS716TP versiones anteriores a 1.0.4. 2, GS716TPP versiones anteriores a 1.0.4.2, GS724TPP versiones anteriores a 2.0.6.3, GS724TPv2 versiones anteriores a 2.0.6.3, GS728TPPv2 versiones anteriores a 6.0.8.2, GS728TPv2 versiones anteriores a 6.0.8. 2, GS750E versiones anteriores a 1.0.1.10, GS752TPP versiones anteriores a 6.0.8.2, GS752TPv2 versiones anteriores a 6.0.8.2, MS510TXM versiones anteriores a 1.0.4.2 y MS510TXUP versiones anteriores a 1.0.4.2"}], "id": "CVE-2021-40867", "lastModified": "2024-11-21T06:24:58.477", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 5.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary"}, {"cvssData": {"attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-09-13T08:15:13.323", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://gynvael.coldwind.pl/?id=741"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://gynvael.coldwind.pl/?id=741"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-290"}], "source": "nvd@nist.gov", "type": "Primary"}]}