First published: Thu Dec 30 2021(Updated: )
Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rax43 Firmware | =1.0.3.96 | |
Netgear RAX43 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-20171.
The Netgear RAX43 version 1.0.3.96 is affected by this vulnerability.
This vulnerability allows all usernames and passwords to be stored in plaintext on the device.
Yes, the admin password is stored in plaintext in the primary configuration file.
The severity rating of this vulnerability is medium with a value of 5.5.