CVE-2020-35801
HIGH
8,3
Source: [email protected]
Attack Vector: adjacent_network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: high
Availability: high
MEDIUM
5,5
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: single
Confidentiality: none
Integrity: partial
Availability: partial
Description
AI Translation Available
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects JGS516PE before 2.6.0.48, JGS524Ev2 before 2.6.0.48, JGS524PE before 2.6.0.48, and GS116Ev2 before 2.6.0.48. A TFTP server was found to be active by default. It allows remote authenticated users to update the switch firmware.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0170
Percentile
0,8th
Updated
EPSS Score Trend (Last 91 Days)
Operating System
Jgs524E Firmware by Netgear
Version Range Affected
To
2.6.0.48
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netgear:jgs524e_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Jgs524Pe Firmware by Netgear
Version Range Affected
To
2.6.0.48
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netgear:jgs524pe_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Jgs516Pe Firmware by Netgear
Version Range Affected
To
2.6.0.48
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netgear:jgs516pe_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Gs116E Firmware by Netgear
Version Range Affected
To
2.6.0.48
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netgear:gs116e_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://kb.netgear.com/000062635/Security-Advisory-for-Security-Misconfiguratio…
https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabil…
https://kb.netgear.com/000062635/Security-Advisory-for-Security-Misconfiguratio…
https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabil…