Vulnerability Description
Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Rax43 Firmware | 1.0.3.96 |
| Netgear | Rax43 | - |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2021-55Third Party Advisory
- https://www.tenable.com/security/research/tra-2021-55Third Party Advisory
FAQ
What is CVE-2021-20171?
CVE-2021-20171 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin...
How severe is CVE-2021-20171?
CVE-2021-20171 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-20171?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Rax43 Firmware, Netgear Rax43.