Логотип exploitDog
bind:CVE-2022-4390
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-4390

Количество 3

Количество 3

nvd логотип

CVE-2022-4390

около 3 лет назад

A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned on ports 22 and 23 by default. This misconfiguration could allow an attacker to interact with services only intended to be accessible by clients on the local network.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-j7vr-c84p-54jm

около 3 лет назад

A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned on ports 22 and 23 by default. This misconfiguration could allow an attacker to interact with services only intended to be accessible by clients on the local network.

CVSS3: 10
EPSS: Низкий
fstec логотип

BDU:2022-07175

около 3 лет назад

Уязвимость интерфейса WAN микропрограммного обеспечения маршрутизаторов Netgear RAX30, позволяющая нарушителю получить доступ к работающим службам и открытым портам

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-4390

A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned on ports 22 and 23 by default. This misconfiguration could allow an attacker to interact with services only intended to be accessible by clients on the local network.

CVSS3: 10
0%
Низкий
около 3 лет назад
github логотип
GHSA-j7vr-c84p-54jm

A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned on ports 22 and 23 by default. This misconfiguration could allow an attacker to interact with services only intended to be accessible by clients on the local network.

CVSS3: 10
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2022-07175

Уязвимость интерфейса WAN микропрограммного обеспечения маршрутизаторов Netgear RAX30, позволяющая нарушителю получить доступ к работающим службам и открытым портам

CVSS3: 9.8
0%
Низкий
около 3 лет назад

Уязвимостей на страницу