CVE-2017-9490

The Comcast firmware on Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices allows configuration changes via CSRF.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:dpc3939b_firmware:dpc3939b-v303r204217-150321a-cmcst:*:*:*:*:*:*:*
cpe:2.3:h:cisco:dpc3939b:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:arris:tg1682g_firmware:10.0.132.sip.pc20.ct:*:*:*:*:*:*:*
cpe:2.3:o:arris:tg1682g_firmware:tg1682_2.2p7s2_prod_sey:*:*:*:*:*:*:*
cpe:2.3:h:commscope:arris_tg1682g:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:36

Type Values Removed Values Added
References () https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-33.cross-site-request-forgery.txt - Exploit, Third Party Advisory () https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-33.cross-site-request-forgery.txt - Exploit, Third Party Advisory

Information

Published : 2017-07-31 03:29

Updated : 2024-11-21 03:36


NVD link : CVE-2017-9490

Mitre link : CVE-2017-9490

CVE.ORG link : CVE-2017-9490


JSON object : View

Products Affected

commscope

  • arris_tg1682g

cisco

  • dpc3939b_firmware
  • dpc3939b

arris

  • tg1682g_firmware
CWE
CWE-352

Cross-Site Request Forgery (CSRF)