Vulnerability Details CVE-2021-20169
Netgear RAX43 version 1.0.3.96 does not utilize secure communications to the web interface. By default, all communication to/from the device is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 4.5%
CVSS Severity
CVSS v3 Score 6.8
CVSS v2 Score 7.2
Products affected by CVE-2021-20169
-
cpe:2.3:h:netgear:rax43:-
-
cpe:2.3:o:netgear:rax43_firmware:1.0.3.96