ID

VAR-201612-0237


CVE

CVE-2016-7454


TITLE

XFINITY Gateway Technicolor Cross-Site Request Forgery Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2016-13024 // CNNVD: CNNVD-201612-346

DESCRIPTION

CSRF vulnerability on Technicolor TC dpc3941T (formerly Cisco dpc3941T) devices with firmware dpc3941-P20-18-v303r20421733-160413a-CMCST allows an attacker to change the Wi-Fi password, open the remote management interface, or reset the router. XFINITYTechnicolorTCdpc3941T is a gateway product for multimedia in XFINITY, USA. A cross-site request forgery vulnerability exists in the TechnicolorTCdpc3941T device using the dpc3941-P20-18-v303r20421733-160413a-CMCST firmware. XFINITY Gateway Technicolor is prone to a cross-site request-forgery vulnerability because it fails to properly validate HTTP requests. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. XFINITY Gateway Technicolor DPC3941T is vulnerable

Trust: 2.52

sources: NVD: CVE-2016-7454 // JVNDB: JVNDB-2016-006476 // CNVD: CNVD-2016-13024 // BID: 94881 // VULHUB: VHN-96274

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['network device']sub_category:router

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2016-13024

AFFECTED PRODUCTS

vendor:technicolormodel:xfinity gateway router dpc3941tscope:eqversion:dpc3941-p20-18-v303r20421733-160413a-cmcst

Trust: 1.6

vendor:technicolormodel:dpc3941tscope: - version: -

Trust: 0.8

vendor:technicolormodel:dpc3941tscope:eqversion:dpc3941-p20-18-v303r20421733-160413a-cmcst

Trust: 0.8

vendor:xfinitymodel:gateway technicolor dpc3941tscope: - version: -

Trust: 0.6

vendor:technicolormodel:xfinity gateway dpc3941tscope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2016-13024 // BID: 94881 // JVNDB: JVNDB-2016-006476 // CNNVD: CNNVD-201612-346 // NVD: CVE-2016-7454

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-7454
value: HIGH

Trust: 1.0

NVD: CVE-2016-7454
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-13024
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201612-346
value: HIGH

Trust: 0.6

VULHUB: VHN-96274
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-7454
severity: HIGH
baseScore: 7.9
vectorString: AV:A/AC:M/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-13024
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-96274
severity: HIGH
baseScore: 7.9
vectorString: AV:A/AC:M/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-7454
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-13024 // VULHUB: VHN-96274 // JVNDB: JVNDB-2016-006476 // CNNVD: CNNVD-201612-346 // NVD: CVE-2016-7454

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-96274 // JVNDB: JVNDB-2016-006476 // NVD: CVE-2016-7454

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201612-346

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201612-346

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-006476

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-96274

PATCH

title:DPC3941Tv3url:http://www.technicolor.com/en/search/site/DPC3941T

Trust: 0.8

sources: JVNDB: JVNDB-2016-006476

EXTERNAL IDS

db:NVDid:CVE-2016-7454

Trust: 3.5

db:PACKETSTORMid:140121

Trust: 3.1

db:BIDid:94881

Trust: 2.6

db:JVNDBid:JVNDB-2016-006476

Trust: 0.8

db:CNVDid:CNVD-2016-13024

Trust: 0.6

db:CNNVDid:CNNVD-201612-346

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:EXPLOIT-DBid:40982

Trust: 0.1

db:VULHUBid:VHN-96274

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2016-13024 // VULHUB: VHN-96274 // BID: 94881 // JVNDB: JVNDB-2016-006476 // CNNVD: CNNVD-201612-346 // NVD: CVE-2016-7454

REFERENCES

url:https://packetstormsecurity.com/files/140121/xfinity-gateway-technicolor-dpc3941t-cross-site-request-forgery.html

Trust: 3.1

url:http://www.securityfocus.com/bid/94881

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7454

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-7454

Trust: 0.8

url:http://www.technicolorbroadbandpartner.com/

Trust: 0.3

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2016-13024 // VULHUB: VHN-96274 // BID: 94881 // JVNDB: JVNDB-2016-006476 // CNNVD: CNNVD-201612-346 // NVD: CVE-2016-7454

CREDITS

Ayushman Dutta.

Trust: 0.9

sources: BID: 94881 // CNNVD: CNNVD-201612-346

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2016-13024
db:VULHUBid:VHN-96274
db:BIDid:94881
db:JVNDBid:JVNDB-2016-006476
db:CNNVDid:CNNVD-201612-346
db:NVDid:CVE-2016-7454

LAST UPDATE DATE

2025-04-13T19:57:57.152000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-13024date:2016-12-26T00:00:00
db:VULHUBid:VHN-96274date:2016-12-21T00:00:00
db:BIDid:94881date:2016-12-20T01:09:00
db:JVNDBid:JVNDB-2016-006476date:2017-01-04T00:00:00
db:CNNVDid:CNNVD-201612-346date:2016-12-19T00:00:00
db:NVDid:CVE-2016-7454date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-13024date:2016-12-26T00:00:00
db:VULHUBid:VHN-96274date:2016-12-17T00:00:00
db:BIDid:94881date:2016-12-12T00:00:00
db:JVNDBid:JVNDB-2016-006476date:2017-01-04T00:00:00
db:CNNVDid:CNNVD-201612-346date:2016-12-14T00:00:00
db:NVDid:CVE-2016-7454date:2016-12-17T03:59:00.140