Vulnerability Details : CVE-2019-20724
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.75, D6000 before 1.0.0.75, D6100 before 1.0.0.63, D7800 before 1.0.1.44, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, R8900 before 1.0.4.2, R9000 before 1.0.4.2, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBS40 before 2.3.0.28, WNDR3700v4 before 1.0.2.102, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.68, and XR500 before 2.3.2.32.
Products affected by CVE-2019-20724
- cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-20724
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-20724
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.2
|
MEDIUM | AV:A/AC:L/Au:S/C:P/I:P/A:P |
5.1
|
6.4
|
NIST | |
6.8
|
MEDIUM | CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.9
|
5.9
|
MITRE | |
6.8
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.9
|
5.9
|
NIST |
CWE ids for CVE-2019-20724
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-20724
-
https://kb.netgear.com/000061204/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0144
Security Advisory for Post-Authentication Command Injection on Some Routers, Gateways, and WiFi Systems, PSV-2018-0144 | Answer | NETGEAR SupportVendor Advisory
Jump to