Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
D7000 Hardware solutions / Routers & switches, VoIP, GSM, etc JNR1010v2 Hardware solutions / Routers & switches, VoIP, GSM, etc JWNR2010v5 Hardware solutions / Routers & switches, VoIP, GSM, etc PR2000 fixed Hardware solutions / Routers & switches, VoIP, GSM, etc R6020 Hardware solutions / Routers & switches, VoIP, GSM, etc R6050 Hardware solutions / Routers & switches, VoIP, GSM, etc JR6150 Hardware solutions / Routers & switches, VoIP, GSM, etc R6120 Hardware solutions / Routers & switches, VoIP, GSM, etc R6220 Hardware solutions / Routers & switches, VoIP, GSM, etc R6230 Hardware solutions / Routers & switches, VoIP, GSM, etc R6700v3 Hardware solutions / Routers & switches, VoIP, GSM, etc WN3000RP Hardware solutions / Routers & switches, VoIP, GSM, etc WN3000RPv2 Hardware solutions / Routers & switches, VoIP, GSM, etc WN3000RPv3 Hardware solutions / Routers & switches, VoIP, GSM, etc WN3100RPv2 Hardware solutions / Routers & switches, VoIP, GSM, etc WNR1000v4 Hardware solutions / Routers & switches, VoIP, GSM, etc WNR2020 Hardware solutions / Routers & switches, VoIP, GSM, etc WNR2050 Hardware solutions / Routers & switches, VoIP, GSM, etc D7800 Hardware solutions / Routers for home users R6400v2 Hardware solutions / Routers for home users R7000 Hardware solutions / Routers for home users R7000P Hardware solutions / Routers for home users R7100LG Hardware solutions / Routers for home users R7500v2 Hardware solutions / Routers for home users R7800 Hardware solutions / Routers for home users WNR2000v5 Hardware solutions / Routers for home users |
Vendor | NETGEAR |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU73701
Risk: Low
CVSSv4.0: 2.1 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to a security misconfiguration issue. A local attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsD7000: All versions
D7800: All versions
JNR1010v2: All versions
JWNR2010v5: All versions
PR2000 fixed: All versions
R6020: All versions
R6050: All versions
JR6150: All versions
R6120: All versions
R6220: All versions
R6230: All versions
R6400v2: All versions
R6700v3: All versions
R7000: All versions
R7000P: All versions
R7100LG: All versions
R7500v2: All versions
R7800: All versions
WN3000RP: All versions
WN3000RPv2: All versions
WN3000RPv3: All versions
WN3100RPv2: All versions
WNR1000v4: All versions
WNR2000v5: All versions
WNR2020: All versions
WNR2050: All versions
CPE2.3Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.