{"api_version":"1","generated_at":"2026-04-23T06:31:35+00:00","cve":"CVE-2023-1327","urls":{"html":"https://cve.report/CVE-2023-1327","api":"https://cve.report/api/cve/CVE-2023-1327.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1327","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1327"},"summary":{"title":"CVE-2023-1327","description":"Netgear RAX30 (AX2400), prior to version 1.0.6.74, was affected by an authentication bypass vulnerability, allowing an unauthenticated attacker to gain administrative access to the device's web management interface by resetting the admin password.","state":"PUBLIC","assigner":"vulnreport@tenable.com","published_at":"2023-03-14 22:15:00","updated_at":"2023-03-21 17:59:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://drupal9.tenable.com/security/research/tra-2023-10","name":"https://drupal9.tenable.com/security/research/tra-2023-10","refsource":"MISC","tags":[],"title":"Sign in ・ Cloudflare Access","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/advisories/GHSA-pvxx-rv48-qw5m","name":"https://github.com/advisories/GHSA-pvxx-rv48-qw5m","refsource":"MISC","tags":["Third Party Advisory"],"title":"Netgear RAX30 (AX2400), prior to version 1.0.6.74, was... · CVE-2023-1327 · GitHub Advisory Database · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1327","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1327","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1327","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netgear","cpe5":"rax30","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1327","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netgear","cpe5":"rax30_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2023-1327","ASSIGNER":"vulnreport@tenable.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Netgear RAX30 (AX2400)","version":{"version_data":[{"version_value":"All versions prior to version 1.0.6.74"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Authentication Bypass"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://drupal9.tenable.com/security/research/tra-2023-10","url":"https://drupal9.tenable.com/security/research/tra-2023-10"}]},"description":{"description_data":[{"lang":"eng","value":"Netgear RAX30 (AX2400), prior to version 1.0.6.74, was affected by an authentication bypass vulnerability, allowing an unauthenticated attacker to gain administrative access to the device's web management interface by resetting the admin password."}]}},"nvd":{"publishedDate":"2023-03-14 22:15:00","lastModifiedDate":"2023-03-21 17:59:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.6.74","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}