KLA10704
Multiple vulnerabilities in ARRIS cable modems.

Обновлено: 03/06/2020
Дата обнаружения
03/12/2015
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in ARRIS cable modems. Malicious users can exploit these vulnerabilities to gain privileges or inject arbitrary code.

Below is a complete list of vulnerabilities:

  1. Predictable technician password can be exploited remotely to gain technician privileges;
  2. Unknown vulnerability at web management interface can be exploited remotely to gain arbitrary user privileges;
  3. Unknown vulnerability at web management initerface can be exploited remotely via a specially designed pwd parameter to inject arbitrary script or HTML;
  4. Hardcoded administrator password can be exploited remotely from vectors related to web management interface, SSH, TELNET, SNMP to gain administrator privileges.

Technical details

Vulnerabilities (2, 3) related to adv_pwd_cgi.

Vulnerability (4) caused by hardcoded administrators password derived from serial number.

Пораженные продукты

Arris devices DG860A, TG862A, and TG862G with firmware versions from TS0703128_100611 through TS0705125D_031115

Решение

Try to avoid using this accessory in accountable issues.

Первичный источник обнаружения
Vulnerability Notes Database
Оказываемое влияние
?
CI 
[?]

PE 
[?]
Связанные продукты
Multiple devices
CVE-IDS
CVE-2015-72916.8High
CVE-2015-72904.3Warning
CVE-2009-51494.3Warning
CVE-2015-72899.3Critical
Узнай статистику распространения уязвимостей в твоем регионе