ID

VAR-201606-0264


CVE

CVE-2015-8289


TITLE

Netgear D6000 and D3600 contain hard-coded cryptographic keys and are vulnerable to authentication bypass

Trust: 0.8

sources: CERT/CC: VU#778696

DESCRIPTION

The password-recovery feature on NETGEAR D3600 devices with firmware 1.0.0.49 and D6000 devices with firmware 1.0.0.49 and earlier allows remote attackers to discover the cleartext administrator password by reading the cgi-bin/passrec.asp HTML source code. The Netgear D6000 and D3600 routers are vulnerable to authentication bypass and contain hard-coded cryptographic keys embedded in their firmware. The Netgear D6000 and D3600 are both wireless router products from Netgear. An attacker can exploit these issues to bypass the authentication mechanism, obtain sensitive information. This may aid in further attacks

Trust: 3.33

sources: NVD: CVE-2015-8289 // CERT/CC: VU#778696 // JVNDB: JVNDB-2015-007205 // CNVD: CNVD-2016-04302 // BID: 91153 // VULHUB: VHN-86250 // VULMON: CVE-2015-8289

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-04302

AFFECTED PRODUCTS

vendor:netgearmodel:d3600scope:eqversion:1.0.0.49

Trust: 2.2

vendor:netgearmodel:d6000scope:lteversion:1.0.0.49

Trust: 1.0

vendor:netgearmodel: - scope: - version: -

Trust: 0.8

vendor:net gearmodel:d3600scope: - version: -

Trust: 0.8

vendor:net gearmodel:d3600scope:eqversion:1.0.0.49

Trust: 0.8

vendor:net gearmodel:d6000scope: - version: -

Trust: 0.8

vendor:net gearmodel:d6000scope:lteversion:1.0.0.49

Trust: 0.8

vendor:netgearmodel:d6000scope:lteversion:<=1.0.0.49

Trust: 0.6

vendor:netgearmodel:d6000scope:eqversion:1.0.0.49

Trust: 0.6

sources: CERT/CC: VU#778696 // CNVD: CNVD-2016-04302 // JVNDB: JVNDB-2015-007205 // NVD: CVE-2015-8289 // CNNVD: CNNVD-201606-233

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2015-8289
value: HIGH

Trust: 1.8

CNVD: CNVD-2016-04302
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201606-233
value: MEDIUM

Trust: 0.6

VULHUB: VHN-86250
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-8289
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2015-8289
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.9

CNVD: CNVD-2016-04302
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-86250
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.0

NVD: CVE-2015-8289
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2016-04302 // VULHUB: VHN-86250 // VULMON: CVE-2015-8289 // JVNDB: JVNDB-2015-007205 // NVD: CVE-2015-8289 // CNNVD: CNNVD-201606-233

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-86250 // JVNDB: JVNDB-2015-007205 // NVD: CVE-2015-8289

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201606-233

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201606-233

CONFIGURATIONS

sources: NVD: CVE-2015-8289

PATCH

title:CVE-2015-8289 - Authentication Bypass Using an Alternate Path or Channelurl:http://kb.netgear.com/app/answers/detail/a_id/30490

Trust: 0.8

title:Patch for NetgearD6000 and D3600 Password Disclosure Vulnerabilitiesurl:https://www.cnvd.org.cn/patchinfo/show/78115

Trust: 0.6

title:Netgear D6000 and D3600 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62188

Trust: 0.6

title:Threatposturl:https://threatpost.com/netgear-router-update-removes-hardcoded-crypto-keys/118606/

Trust: 0.1

sources: CNVD: CNVD-2016-04302 // VULMON: CVE-2015-8289 // JVNDB: JVNDB-2015-007205 // CNNVD: CNNVD-201606-233

EXTERNAL IDS

db:CERT/CCid:VU#778696

Trust: 4.0

db:NVDid:CVE-2015-8289

Trust: 3.5

db:JVNid:JVNVU94303845

Trust: 0.8

db:JVNDBid:JVNDB-2015-007205

Trust: 0.8

db:CNNVDid:CNNVD-201606-233

Trust: 0.7

db:CNVDid:CNVD-2016-04302

Trust: 0.6

db:BIDid:91153

Trust: 0.3

db:VULHUBid:VHN-86250

Trust: 0.1

db:VULMONid:CVE-2015-8289

Trust: 0.1

sources: CERT/CC: VU#778696 // CNVD: CNVD-2016-04302 // VULHUB: VHN-86250 // VULMON: CVE-2015-8289 // BID: 91153 // JVNDB: JVNDB-2015-007205 // NVD: CVE-2015-8289 // CNNVD: CNNVD-201606-233

REFERENCES

url:http://www.kb.cert.org/vuls/id/778696

Trust: 3.3

url:http://kb.netgear.com/app/answers/detail/a_id/30490

Trust: 2.6

url:http://kb.netgear.com/app/answers/detail/a_id/30560

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8289

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94303845/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8289

Trust: 0.8

url:http://www.netgear.com

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/255.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/netgear-router-update-removes-hardcoded-crypto-keys/118606/

Trust: 0.1

sources: CERT/CC: VU#778696 // CNVD: CNVD-2016-04302 // VULHUB: VHN-86250 // VULMON: CVE-2015-8289 // BID: 91153 // JVNDB: JVNDB-2015-007205 // NVD: CVE-2015-8289 // CNNVD: CNNVD-201606-233

CREDITS

Mandar Jadhav of Qualys

Trust: 0.6

sources: CNNVD: CNNVD-201606-233

SOURCES

db:CERT/CCid:VU#778696
db:CNVDid:CNVD-2016-04302
db:VULHUBid:VHN-86250
db:VULMONid:CVE-2015-8289
db:BIDid:91153
db:JVNDBid:JVNDB-2015-007205
db:NVDid:CVE-2015-8289
db:CNNVDid:CNNVD-201606-233

LAST UPDATE DATE

2023-12-18T13:03:18.171000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#778696date:2016-07-01T00:00:00
db:CNVDid:CNVD-2016-04302date:2016-06-24T00:00:00
db:VULHUBid:VHN-86250date:2016-06-21T00:00:00
db:VULMONid:CVE-2015-8289date:2016-06-21T00:00:00
db:BIDid:91153date:2016-06-10T00:00:00
db:JVNDBid:JVNDB-2015-007205date:2016-06-22T00:00:00
db:NVDid:CVE-2015-8289date:2016-06-21T22:02:48.737
db:CNNVDid:CNNVD-201606-233date:2016-06-21T00:00:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#778696date:2016-06-10T00:00:00
db:CNVDid:CNVD-2016-04302date:2016-06-24T00:00:00
db:VULHUBid:VHN-86250date:2016-06-20T00:00:00
db:VULMONid:CVE-2015-8289date:2016-06-20T00:00:00
db:BIDid:91153date:2016-06-10T00:00:00
db:JVNDBid:JVNDB-2015-007205date:2016-06-22T00:00:00
db:NVDid:CVE-2015-8289date:2016-06-20T01:59:01.133
db:CNNVDid:CNNVD-201606-233date:2016-06-12T00:00:00