ID

VAR-201707-1018


CVE

CVE-2017-9492


TITLE

plural Cisco DPC Products and Arris TG1682G Vulnerable to information disclosure

Trust: 0.8

sources: JVNDB: JVNDB-2017-006593

DESCRIPTION

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies. plural Cisco DPC Products and Arris TG1682G Contains an information disclosure vulnerability.Information may be obtained. Cisco DPC3939 (XB3) and so on are Cisco's wireless home voice gateway products. The ArrisTG1682G is a modem product from Arris, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. There are security holes in the Comcast firmware in several products. A remote attacker can exploit this vulnerability to obtain sensitive information

Trust: 2.25

sources: NVD: CVE-2017-9492 // JVNDB: JVNDB-2017-006593 // CNVD: CNVD-2017-26627 // VULHUB: VHN-117695

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-26627

AFFECTED PRODUCTS

vendor:ciscomodel:dpc3941tscope:eqversion:dpc3941_2.5s3_prod_sey

Trust: 1.6

vendor:ciscomodel:dpc3939bscope:eqversion:dpc3939b-v303r204217-150321a-cmcst

Trust: 1.6

vendor:ciscomodel:dpc3939scope:eqversion:dpc3939-p20-18-v303r20421746-170221a-cmcst

Trust: 1.6

vendor:ciscomodel:dpc3939scope:eqversion:dpc3939-p20-18-v303r20421733-160420a-cmcst

Trust: 1.6

vendor:commscopemodel:arris tg1682gscope:eqversion:10.0.132.sip.pc20.ct

Trust: 1.0

vendor:commscopemodel:arris tg1682gscope:eqversion:tg1682_2.2p7s2_prod_sey

Trust: 1.0

vendor:arris groupmodel:tg1682gscope: - version: -

Trust: 0.8

vendor:ciscomodel:dpc3939 wireless residential voice gatewayscope: - version: -

Trust: 0.8

vendor:ciscomodel:dpc3939b business wireless gatewayscope: - version: -

Trust: 0.8

vendor:ciscomodel:dpc3941t wireless residential voice gatewayscope: - version: -

Trust: 0.8

vendor:ciscomodel:dpc3939 dpc3939-p20-18-v303r20421746-170221a-cmcstscope: - version: -

Trust: 0.6

vendor:ciscomodel:dpc3941t dpc3941 2.5s3 prod seyscope: - version: -

Trust: 0.6

vendor:ciscomodel:dpc3939b dpc3939b-v303r204217-150321a-cmcstscope: - version: -

Trust: 0.6

vendor:ciscomodel:dpc3939 dpc3939-p20-18-v303r20421733-160420a-cmcstscope: - version: -

Trust: 0.6

vendor:arrismodel:tg1682g emta&docsis 10.0.132.sip.pc20.ctscope: - version: -

Trust: 0.6

vendor:arrismodel:tg1682g tg1682 2.2p7s2 prod seyscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2017-26627 // JVNDB: JVNDB-2017-006593 // CNNVD: CNNVD-201706-225 // NVD: CVE-2017-9492

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-9492
value: HIGH

Trust: 1.0

NVD: CVE-2017-9492
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-26627
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201706-225
value: HIGH

Trust: 0.6

VULHUB: VHN-117695
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-9492
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-26627
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-117695
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-9492
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2017-9492
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-26627 // VULHUB: VHN-117695 // JVNDB: JVNDB-2017-006593 // CNNVD: CNNVD-201706-225 // NVD: CVE-2017-9492

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-117695 // JVNDB: JVNDB-2017-006593 // NVD: CVE-2017-9492

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-225

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201706-225

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-006593

PATCH

title:TG1682Gurl:http://arris.force.com/consumers/ConsumerProductDetail?p=a0ha000000TnNmSAAV&c=Touchstone%20Modems%20and%20Gateways

Trust: 0.8

title:トップページurl:https://www.cisco.com/c/ja_jp/index.html

Trust: 0.8

sources: JVNDB: JVNDB-2017-006593

EXTERNAL IDS

db:NVDid:CVE-2017-9492

Trust: 3.1

db:JVNDBid:JVNDB-2017-006593

Trust: 0.8

db:CNNVDid:CNNVD-201706-225

Trust: 0.7

db:CNVDid:CNVD-2017-26627

Trust: 0.6

db:VULHUBid:VHN-117695

Trust: 0.1

sources: CNVD: CNVD-2017-26627 // VULHUB: VHN-117695 // JVNDB: JVNDB-2017-006593 // CNNVD: CNNVD-201706-225 // NVD: CVE-2017-9492

REFERENCES

url:https://github.com/bastilleresearch/cabletap/blob/master/doc/advisories/bastille-35.improper-cookie-flags.txt

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9492

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9492

Trust: 0.8

sources: CNVD: CNVD-2017-26627 // VULHUB: VHN-117695 // JVNDB: JVNDB-2017-006593 // CNNVD: CNNVD-201706-225 // NVD: CVE-2017-9492

SOURCES

db:CNVDid:CNVD-2017-26627
db:VULHUBid:VHN-117695
db:JVNDBid:JVNDB-2017-006593
db:CNNVDid:CNNVD-201706-225
db:NVDid:CVE-2017-9492

LAST UPDATE DATE

2025-04-20T23:27:22.204000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-26627date:2017-09-14T00:00:00
db:VULHUBid:VHN-117695date:2017-08-03T00:00:00
db:JVNDBid:JVNDB-2017-006593date:2017-08-30T00:00:00
db:CNNVDid:CNNVD-201706-225date:2021-09-14T00:00:00
db:NVDid:CVE-2017-9492date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-26627date:2017-09-14T00:00:00
db:VULHUBid:VHN-117695date:2017-07-31T00:00:00
db:JVNDBid:JVNDB-2017-006593date:2017-08-30T00:00:00
db:CNNVDid:CNNVD-201706-225date:2017-06-08T00:00:00
db:NVDid:CVE-2017-9492date:2017-07-31T03:29:00.737