Vulnerability Description
This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the MibController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12122.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Prosafe Network Management System | 1.6.0.26 |
Related Weaknesses (CWE)
References
- https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS3Vendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-21-359/Third Party AdvisoryVDB Entry
- https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS3Vendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-21-359/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2021-27276?
CVE-2021-27276 is a vulnerability with a CVSS score of 7.1 (HIGH). This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit thi...
How severe is CVE-2021-27276?
CVE-2021-27276 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-27276?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Prosafe Network Management System.