ID

VAR-202002-0303


CVE

CVE-2019-17137


TITLE

NETGEAR AC1200 mini_httpd Poison Null Byte Authentication Bypass Vulnerability

Trust: 1.3

sources: ZDI: ZDI-19-866 // CNVD: CNVD-2019-35796

DESCRIPTION

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 R6220 Firmware version 1.1.0.86 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-8616. NETGEAR AC1200 R6220 There is an authentication vulnerability in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. NETGEAR AC1200 is a wireless router from NETGEAR

Trust: 2.79

sources: NVD: CVE-2019-17137 // JVNDB: JVNDB-2019-014553 // ZDI: ZDI-19-866 // CNVD: CNVD-2019-35796

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-35796

AFFECTED PRODUCTS

vendor:netgearmodel:ac1200 r6220scope:eqversion:1.1.0.86

Trust: 1.8

vendor:netgearmodel:ac1200scope: - version: -

Trust: 1.3

sources: ZDI: ZDI-19-866 // CNVD: CNVD-2019-35796 // JVNDB: JVNDB-2019-014553 // NVD: CVE-2019-17137

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-17137
value: CRITICAL

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2019-17137
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2019-014553
value: CRITICAL

Trust: 0.8

ZDI: CVE-2019-17137
value: CRITICAL

Trust: 0.7

CNVD: CNVD-2019-35796
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201910-700
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2019-17137
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-014553
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2019-35796
severity: HIGH
baseScore: 9.7
vectorString: AV:N/AC:L/AU:N/C:C/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-17137
baseSeverity: CRITICAL
baseScore: 9.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.5
version: 3.1

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2019-17137
baseSeverity: CRITICAL
baseScore: 9.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.5
version: 3.0

Trust: 1.0

NVD: JVNDB-2019-014553
baseSeverity: CRITICAL
baseScore: 9.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2019-17137
baseSeverity: CRITICAL
baseScore: 9.4
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.5
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-19-866 // CNVD: CNVD-2019-35796 // JVNDB: JVNDB-2019-014553 // CNNVD: CNNVD-201910-700 // NVD: CVE-2019-17137 // NVD: CVE-2019-17137

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-626

Trust: 1.0

problemtype:CWE-287

Trust: 0.8

sources: JVNDB: JVNDB-2019-014553 // NVD: CVE-2019-17137

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201910-700

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201910-700

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-014553

PATCH

title:Top Pageurl:https://www.netgear.com/

Trust: 0.8

sources: JVNDB: JVNDB-2019-014553

EXTERNAL IDS

db:NVDid:CVE-2019-17137

Trust: 3.7

db:ZDIid:ZDI-19-866

Trust: 3.7

db:JVNDBid:JVNDB-2019-014553

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-8616

Trust: 0.7

db:CNVDid:CNVD-2019-35796

Trust: 0.6

db:CNNVDid:CNNVD-201910-700

Trust: 0.6

sources: ZDI: ZDI-19-866 // CNVD: CNVD-2019-35796 // JVNDB: JVNDB-2019-014553 // CNNVD: CNNVD-201910-700 // NVD: CVE-2019-17137

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-19-866/

Trust: 3.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-17137

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17137

Trust: 0.8

sources: CNVD: CNVD-2019-35796 // JVNDB: JVNDB-2019-014553 // CNNVD: CNNVD-201910-700 // NVD: CVE-2019-17137

CREDITS

Michael Flanders of Trend Micro Zero Day Initiative

Trust: 1.3

sources: ZDI: ZDI-19-866 // CNNVD: CNNVD-201910-700

SOURCES

db:ZDIid:ZDI-19-866
db:CNVDid:CNVD-2019-35796
db:JVNDBid:JVNDB-2019-014553
db:CNNVDid:CNNVD-201910-700
db:NVDid:CVE-2019-17137

LAST UPDATE DATE

2024-11-23T22:44:44.339000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-19-866date:2020-01-06T00:00:00
db:CNVDid:CNVD-2019-35796date:2019-10-18T00:00:00
db:JVNDBid:JVNDB-2019-014553date:2020-02-28T00:00:00
db:CNNVDid:CNNVD-201910-700date:2020-10-10T00:00:00
db:NVDid:CVE-2019-17137date:2024-11-21T04:31:46.110

SOURCES RELEASE DATE

db:ZDIid:ZDI-19-866date:2019-10-10T00:00:00
db:CNVDid:CNVD-2019-35796date:2019-10-18T00:00:00
db:JVNDBid:JVNDB-2019-014553date:2020-02-28T00:00:00
db:CNNVDid:CNNVD-201910-700date:2019-10-10T00:00:00
db:NVDid:CVE-2019-17137date:2020-02-10T21:51:10.563