ID

VAR-201707-1013


CVE

CVE-2017-9487


TITLE

Cisco DPC3939 and DPC3941T Vulnerable to information disclosure

Trust: 0.8

sources: JVNDB: JVNDB-2017-006524

DESCRIPTION

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) and DPC3941T (firmware version DPC3941_2.5s3_PROD_sey) devices allows remote attackers to discover a WAN IPv6 IP address by leveraging knowledge of the CM MAC address. Cisco DPC3939 and DPC3941T Contains an information disclosure vulnerability.Information may be obtained. The Cisco DPC3939 and DPC3941T are both Cisco Wireless Voice Gateway products. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A security vulnerability exists in the Cisco DPC3939 using the dpc3939-P20-18-v303r20421746-170221a-CMCST firmware and the Comcast firmware in the DPC3941T using the DPC3941_2.5s3_PROD_sey firmware. A remote attacker could exploit this vulnerability to obtain a WANIPv6 IP address

Trust: 2.25

sources: NVD: CVE-2017-9487 // JVNDB: JVNDB-2017-006524 // CNVD: CNVD-2017-26623 // VULHUB: VHN-117690

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-26623

AFFECTED PRODUCTS

vendor:ciscomodel:dpc3941tscope:eqversion:dpc3941_2.5s3_prod_sey

Trust: 1.6

vendor:ciscomodel:dpc3939scope:eqversion:dpc3939-p20-18-v303r20421746-170221a-cmcst

Trust: 1.6

vendor:ciscomodel:dpc3939 wireless residential voice gatewayscope:eqversion:dpc3939-p20-18-v303r20421746-170221a-cmcst

Trust: 0.8

vendor:ciscomodel:dpc3941t wireless residential voice gatewayscope:eqversion:dpc3941_2.5s3_prod_sey

Trust: 0.8

vendor:ciscomodel:dpc3939 dpc3939-p20-18-v303r20421746-170221a-cmcstscope: - version: -

Trust: 0.6

vendor:ciscomodel:dpc3941t dpc3941 2.5s3 prod seyscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2017-26623 // JVNDB: JVNDB-2017-006524 // CNNVD: CNNVD-201706-230 // NVD: CVE-2017-9487

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9487
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-9487
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-26623
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201706-230
value: MEDIUM

Trust: 0.6

VULHUB: VHN-117690
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-9487
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-26623
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-117690
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-9487
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-26623 // VULHUB: VHN-117690 // JVNDB: JVNDB-2017-006524 // CNNVD: CNNVD-201706-230 // NVD: CVE-2017-9487

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-117690 // JVNDB: JVNDB-2017-006524 // NVD: CVE-2017-9487

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-230

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201706-230

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-006524

PATCH

title:トップページurl:https://www.cisco.com/c/ja_jp/index.html

Trust: 0.8

sources: JVNDB: JVNDB-2017-006524

EXTERNAL IDS

db:NVDid:CVE-2017-9487

Trust: 3.1

db:JVNDBid:JVNDB-2017-006524

Trust: 0.8

db:CNNVDid:CNNVD-201706-230

Trust: 0.7

db:CNVDid:CNVD-2017-26623

Trust: 0.6

db:VULHUBid:VHN-117690

Trust: 0.1

sources: CNVD: CNVD-2017-26623 // VULHUB: VHN-117690 // JVNDB: JVNDB-2017-006524 // CNNVD: CNNVD-201706-230 // NVD: CVE-2017-9487

REFERENCES

url:https://github.com/bastilleresearch/cabletap/blob/master/doc/advisories/bastille-30.wan0-ipv6-cm-mac.txt

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9487

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9487

Trust: 0.8

sources: CNVD: CNVD-2017-26623 // VULHUB: VHN-117690 // JVNDB: JVNDB-2017-006524 // CNNVD: CNNVD-201706-230 // NVD: CVE-2017-9487

SOURCES

db:CNVDid:CNVD-2017-26623
db:VULHUBid:VHN-117690
db:JVNDBid:JVNDB-2017-006524
db:CNNVDid:CNNVD-201706-230
db:NVDid:CVE-2017-9487

LAST UPDATE DATE

2025-04-20T23:32:11.011000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-26623date:2017-09-14T00:00:00
db:VULHUBid:VHN-117690date:2017-08-02T00:00:00
db:JVNDBid:JVNDB-2017-006524date:2017-08-29T00:00:00
db:CNNVDid:CNNVD-201706-230date:2017-11-30T00:00:00
db:NVDid:CVE-2017-9487date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-26623date:2017-09-14T00:00:00
db:VULHUBid:VHN-117690date:2017-07-31T00:00:00
db:JVNDBid:JVNDB-2017-006524date:2017-08-29T00:00:00
db:CNNVDid:CNNVD-201706-230date:2017-06-08T00:00:00
db:NVDid:CVE-2017-9487date:2017-07-31T03:29:00.597