CVE-2021-20171
Summary
| CVE | CVE-2021-20171 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-12-30 22:15:00 UTC |
| Updated | 2022-01-11 14:36:00 UTC |
| Description | Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device. |
Risk And Classification
Problem Types: CWE-312
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Netgear | Rax43 | - | All | All | All |
| Operating System | Netgear | Rax43 Firmware | 1.0.3.96 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Netgear Nighthawk RAX43 Multiple Vulnerabilities - Research Advisory | Tenable® | MISC | www.tenable.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.