ghsa-wcpp-7r83-v4gc
Vulnerability from github
Published
2025-02-18 18:33
Modified
2025-02-19 15:32
Severity ?
VLAI Severity ?
Details
The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack.
{ "affected": [], "aliases": [ "CVE-2022-41545" ], "database_specific": { "cwe_ids": [ "CWE-287", "CWE-319" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-02-18T18:15:13Z", "severity": "CRITICAL" }, "details": "The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack.", "id": "GHSA-wcpp-7r83-v4gc", "modified": "2025-02-19T15:32:12Z", "published": "2025-02-18T18:33:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41545" }, { "type": "WEB", "url": "https://seclists.org/fulldisclosure/2025/Feb/12" }, { "type": "WEB", "url": "https://www.netgear.com/about/security" }, { "type": "WEB", "url": "https://www.netgear.com/images/datasheet/networking/cablemodems/C7800.pdf" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2025/Feb/12" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…