CVE-2021-20170

Severity
8.8HIGH
EPSS
0.2%
top 63.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Latest updateDec 31

Description

Netgear RAX43 version 1.0.3.96 makes use of hardcoded credentials. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted. This encryption is accomplished via a password-protected zip file with a hardcoded password (RAX50w!a4udk). By unzipping the configuration using this password, a user can reconfigure settings not intended to be manipulated, re-zip the configuration, and restore a backup causing these settings t

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5netgear_rax431.0.3.96

🔴Vulnerability Details

2
GHSA
GHSA-v2pc-mrc3-9jc5: Netgear RAX43 version 12021-12-31
CVEList
CVE-2021-20170: Netgear RAX43 version 12021-12-30
CVE-2021-20170 (HIGH CVSS 8.8) | Netgear RAX43 version 1.0.3.96 make | cvebase.io