First published: Thu Dec 30 2021(Updated: )
Netgear RAX43 version 1.0.3.96 does not utilize secure communications to the web interface. By default, all communication to/from the device is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rax43 Firmware | =1.0.3.96 | |
Netgear RAX43 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-20169.
The severity of CVE-2021-20169 is high.
CVE-2021-20169 affects Netgear RAX43 version 1.0.3.96 by not utilizing secure communications to the web interface.
The potential risks of CVE-2021-20169 include the transmission of potentially sensitive information (such as usernames and passwords) in cleartext.
To fix CVE-2021-20169, it is recommended to update the firmware of Netgear RAX43 to a version that utilizes secure communications to the web interface.