Plaintext Storage Vulnerability in Netgear RAX43 Router
CVE-2021-20171
5.5MEDIUM
Summary
The Netgear RAX43 router version 1.0.3.96 has a vulnerability that allows sensitive information to be stored in plaintext. This includes critical data such as usernames and passwords for associated services, which are saved unencrypted in the device's primary configuration file. This flaw poses a significant risk to the security and privacy of users, as it could be exploited to gain unauthorized access to device settings and services.
Affected Version(s)
Netgear RAX43 1.0.3.96
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved