cnvd-2017-00835
Vulnerability from cnvd

Title: 多款NETGEAR路由器存在管理员密码信息泄露漏洞

Description:

NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900和R8000是美国网件(Netgear)公司的无线路由器产品。

多款NETGEAR产品存在信息泄露漏洞。如相关型号开放了互联网配置管理功能,如果身份验证被取消且其密码恢复功能在被禁用的情况下,会自动跳转可暴露包含密码恢复token的页面。攻击者可通过该页面获得管理员密码,取得路由器控制权限。

Severity:

Patch Name: 多款NETGEAR路由器存在管理员密码信息泄露漏洞的补丁

Patch Description:

NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900和R8000是美国网件(Netgear)公司的无线路由器产品。

多款NETGEAR产品存在信息泄露漏洞。如相关型号开放了互联网配置管理功能,如果身份验证被取消且其密码恢复功能在被禁用的情况下,会自动跳转可暴露包含密码恢复token的页面。攻击者可通过该页面获得管理员密码,取得路由器控制权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

用户可参考如下供应商提供的安全公告获得补丁信息: http://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability

Reference: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5521 http://www.securityfocus.com/bid/95457/ http://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability

Impacted products
Name
['NETGEAR R8500 0', 'NETGEAR R7000 0', 'NETGEAR R8300 0', 'NETGEAR R6400 0', 'NETGEAR R7300 0', 'NETGEAR R7100LG 0', 'NETGEAR R6300v2 0', 'NETGEAR WNDR3400v3 0', 'NETGEAR WNR3500Lv2 0', 'NETGEAR R6250 0', 'NETGEAR R6700 0', 'NETGEAR R8000 0', 'NETGEAR R6900 0']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "95457"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-5521"
    }
  },
  "description": "NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900\u548cR8000\u662f\u7f8e\u56fd\u7f51\u4ef6\uff08Netgear\uff09\u516c\u53f8\u7684\u65e0\u7ebf\u8def\u7531\u5668\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eNETGEAR\u4ea7\u54c1\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u5982\u76f8\u5173\u578b\u53f7\u5f00\u653e\u4e86\u4e92\u8054\u7f51\u914d\u7f6e\u7ba1\u7406\u529f\u80fd\uff0c\u5982\u679c\u8eab\u4efd\u9a8c\u8bc1\u88ab\u53d6\u6d88\u4e14\u5176\u5bc6\u7801\u6062\u590d\u529f\u80fd\u5728\u88ab\u7981\u7528\u7684\u60c5\u51b5\u4e0b\uff0c\u4f1a\u81ea\u52a8\u8df3\u8f6c\u53ef\u66b4\u9732\u5305\u542b\u5bc6\u7801\u6062\u590dtoken\u7684\u9875\u9762\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8be5\u9875\u9762\u83b7\u5f97\u7ba1\u7406\u5458\u5bc6\u7801\uff0c\u53d6\u5f97\u8def\u7531\u5668\u63a7\u5236\u6743\u9650\u3002",
  "discovererName": "NetGear",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-00835",
  "openTime": "2017-02-04",
  "patchDescription": "NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900\u548cR8000\u662f\u7f8e\u56fd\u7f51\u4ef6\uff08Netgear\uff09\u516c\u53f8\u7684\u65e0\u7ebf\u8def\u7531\u5668\u4ea7\u54c1\u3002\r\n\r\n\u591a\u6b3eNETGEAR\u4ea7\u54c1\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u5982\u76f8\u5173\u578b\u53f7\u5f00\u653e\u4e86\u4e92\u8054\u7f51\u914d\u7f6e\u7ba1\u7406\u529f\u80fd\uff0c\u5982\u679c\u8eab\u4efd\u9a8c\u8bc1\u88ab\u53d6\u6d88\u4e14\u5176\u5bc6\u7801\u6062\u590d\u529f\u80fd\u5728\u88ab\u7981\u7528\u7684\u60c5\u51b5\u4e0b\uff0c\u4f1a\u81ea\u52a8\u8df3\u8f6c\u53ef\u66b4\u9732\u5305\u542b\u5bc6\u7801\u6062\u590dtoken\u7684\u9875\u9762\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8be5\u9875\u9762\u83b7\u5f97\u7ba1\u7406\u5458\u5bc6\u7801\uff0c\u53d6\u5f97\u8def\u7531\u5668\u63a7\u5236\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eNETGEAR\u8def\u7531\u5668\u5b58\u5728\u7ba1\u7406\u5458\u5bc6\u7801\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "NETGEAR R8500 0",
      "NETGEAR R7000 0",
      "NETGEAR R8300 0",
      "NETGEAR R6400 0",
      "NETGEAR R7300 0",
      "NETGEAR R7100LG 0",
      "NETGEAR R6300v2 0",
      "NETGEAR WNDR3400v3 0",
      "NETGEAR WNR3500Lv2 0",
      "NETGEAR R6250 0",
      "NETGEAR R6700 0",
      "NETGEAR R8000 0",
      "NETGEAR R6900 0"
    ]
  },
  "referenceLink": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5521\r\nhttp://www.securityfocus.com/bid/95457/ \r\nhttp://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability",
  "serverity": "\u4e2d",
  "submitTime": "2017-02-03",
  "title": "\u591a\u6b3eNETGEAR\u8def\u7531\u5668\u5b58\u5728\u7ba1\u7406\u5458\u5bc6\u7801\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…