Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/419568 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/419568 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/419568 - Third Party Advisory, US Government Resource |
Information
Published : 2015-11-21 11:59
Updated : 2024-11-21 02:36
NVD link : CVE-2015-7289
Mitre link : CVE-2015-7289
CVE.ORG link : CVE-2015-7289
JSON object : View
Products Affected
arris
- na_model_862_gw_mono_firmware
- tg862a
- dg860a
- tg862g
CWE
CWE-255
Credentials Management Errors