Vulnerability Description
Trendnet AC2600 TEW-827DRU version 2.08B01 contains an improper access control configuration that could allow for a malicious firmware update. It is possible to manually install firmware that may be malicious in nature as there does not appear to be any signature validation done to determine if it is from a known and trusted source. This includes firmware updates that are done via the automated "check for updates" in the admin interface. If an attacker is able to masquerade as the update server, the device will not verify that the firmware updates downloaded are legitimate.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendnet | Tew-827Dru Firmware | 2.08b01 |
| Trendnet | Tew-827Dru | 2.0 |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2021-54Third Party Advisory
- https://www.tenable.com/security/research/tra-2021-54Third Party Advisory
FAQ
What is CVE-2021-20156?
CVE-2021-20156 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Trendnet AC2600 TEW-827DRU version 2.08B01 contains an improper access control configuration that could allow for a malicious firmware update. It is possible to manually install firmware that may be m...
How severe is CVE-2021-20156?
CVE-2021-20156 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-20156?
Check the references section above for vendor advisories and patch information. Affected products include: Trendnet Tew-827Dru Firmware, Trendnet Tew-827Dru.