U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-6277

Change History

Initial Analysis by NIST 12/22/2016 11:17:44 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netgear:d6220_firmware:1.0.0.22:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:d6400_firmware:1.0.0.56:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r6250_firmware:1.0.4.6_10.1.12:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r6400_firmware:1.0.1.18:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r6700_firmware:1.0.1.14:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r6900_firmware:1.0.1.14:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r7000_firmware:1.0.7.2_1.1.93:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r7100lg_firmware:1.0.0.28:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r7300dst_firmware:1.0.0.46:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r7900_firmware:1.0.1.8:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:netgear:r8000_firmware:1.0.3.26:*:*:*:*:*:*:* (and previous)
     OR
          cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*
          cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-352
Changed Reference Type
http://kb.netgear.com/000036386/CVE-2016-582384 No Types Assigned
http://kb.netgear.com/000036386/CVE-2016-582384 Vendor Advisory, Patch
Changed Reference Type
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ No Types Assigned
http://www.sj-vs.net/a-temporary-fix-for-cert-vu582384-cwe-77-on-netgear-r7000-and-r6400-routers/ Mitigation, Third Party Advisory
Changed Reference Type
https://kalypto.org/research/netgear-vulnerability-expanded/ No Types Assigned
https://kalypto.org/research/netgear-vulnerability-expanded/ Third Party Advisory, Exploit
Changed Reference Type
https://www.exploit-db.com/exploits/40889/ No Types Assigned
https://www.exploit-db.com/exploits/40889/ Third Party Advisory, VDB Entry, Exploit
Changed Reference Type
https://www.kb.cert.org/vuls/id/582384 No Types Assigned
https://www.kb.cert.org/vuls/id/582384 Third Party Advisory, US Government Resource