ID

VAR-201805-0541


CVE

CVE-2018-10990


TITLE

Arris TG1682G Session expiration vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-005127

DESCRIPTION

On Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices, a logout action does not immediately destroy all state on the device related to the validity of the "credential" cookie, which might make it easier for attackers to obtain access at a later time (e.g., "at least for a few minutes"). NOTE: there is no documentation stating that the web UI's logout feature was supposed to do anything beyond removing the cookie from one instance of a web browser; a client-side logout action is often not intended to address cases where a person has made a copy of a cookie outside of a browser. Arris TG1682G Contains a session expiration vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ArrisTouchstoneTelephonyGatewayTG1682G is a Modem (Modem) router integrated machine from Arris Group of the United States. A security vulnerability exists in the ArrisTouchstoneTelephonyGatewayTG1682G9.1.103J6 release that caused the logout operation to fail to immediately clear all states on the device. An attacker could exploit the vulnerability to gain access. Hi, Multiple vulnerabilities exist in Arris Touchstone Telephony Gateway (TG) Series devices, related to its web administration console. The CVEs for these devices have been created: CVE-2018-10989, CVE-2018-10990, CVE-2018-10991. A blog post containing the full disclosure has been created: https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c Thank you. Regards Akshay 'Ax' Sharma

Trust: 2.34

sources: NVD: CVE-2018-10990 // JVNDB: JVNDB-2018-005127 // CNVD: CNVD-2018-13778 // VULHUB: VHN-120805 // PACKETSTORM: 147636

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-13778

AFFECTED PRODUCTS

vendor:commscopemodel:arris tg1682gscope:eqversion:9.1.103j6

Trust: 1.0

vendor:arris groupmodel:tg1682gscope:eqversion:9.1.103j6

Trust: 0.8

vendor:arrismodel:touchstone telephony gateway tg1682g 9.1.103j6scope: - version: -

Trust: 0.6

vendor:arrismodel:tg1682gscope:eqversion:9.1.103j6

Trust: 0.6

sources: CNVD: CNVD-2018-13778 // JVNDB: JVNDB-2018-005127 // CNNVD: CNNVD-201805-416 // NVD: CVE-2018-10990

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-10990
value: HIGH

Trust: 1.0

NVD: CVE-2018-10990
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-13778
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201805-416
value: HIGH

Trust: 0.6

VULHUB: VHN-120805
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-10990
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-13778
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-120805
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-10990
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2018-10990
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-13778 // VULHUB: VHN-120805 // JVNDB: JVNDB-2018-005127 // CNNVD: CNNVD-201805-416 // NVD: CVE-2018-10990

PROBLEMTYPE DATA

problemtype:CWE-613

Trust: 1.9

sources: VULHUB: VHN-120805 // JVNDB: JVNDB-2018-005127 // NVD: CVE-2018-10990

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201805-416

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201805-416

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-005127

PATCH

title:TG1682Gurl:https://arris.secure.force.com/consumers/ConsumerProductDetail?p=a0ha000000TnNmSAAV&c=Touchstone%20Modems%20and%20Gateways

Trust: 0.8

sources: JVNDB: JVNDB-2018-005127

EXTERNAL IDS

db:NVDid:CVE-2018-10990

Trust: 3.2

db:JVNDBid:JVNDB-2018-005127

Trust: 0.8

db:CNNVDid:CNNVD-201805-416

Trust: 0.7

db:CNVDid:CNVD-2018-13778

Trust: 0.6

db:VULHUBid:VHN-120805

Trust: 0.1

db:PACKETSTORMid:147636

Trust: 0.1

sources: CNVD: CNVD-2018-13778 // VULHUB: VHN-120805 // JVNDB: JVNDB-2018-005127 // PACKETSTORM: 147636 // CNNVD: CNNVD-201805-416 // NVD: CVE-2018-10990

REFERENCES

url:https://medium.com/@akshaysharmaus/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c

Trust: 1.6

url:https://medium.com/%40akshaysharmaus/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-10990

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10990

Trust: 0.8

url:https://medium.com/@akshaysharmaus/comcast

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-10991

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10989

Trust: 0.1

sources: CNVD: CNVD-2018-13778 // VULHUB: VHN-120805 // JVNDB: JVNDB-2018-005127 // PACKETSTORM: 147636 // CNNVD: CNNVD-201805-416 // NVD: CVE-2018-10990

CREDITS

Akshay Sharma

Trust: 0.1

sources: PACKETSTORM: 147636

SOURCES

db:CNVDid:CNVD-2018-13778
db:VULHUBid:VHN-120805
db:JVNDBid:JVNDB-2018-005127
db:PACKETSTORMid:147636
db:CNNVDid:CNNVD-201805-416
db:NVDid:CVE-2018-10990

LAST UPDATE DATE

2024-11-23T22:41:51.190000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-13778date:2018-07-24T00:00:00
db:VULHUBid:VHN-120805date:2018-06-19T00:00:00
db:JVNDBid:JVNDB-2018-005127date:2018-07-06T00:00:00
db:CNNVDid:CNNVD-201805-416date:2021-09-14T00:00:00
db:NVDid:CVE-2018-10990date:2024-11-21T03:42:27.017

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-13778date:2018-07-24T00:00:00
db:VULHUBid:VHN-120805date:2018-05-14T00:00:00
db:JVNDBid:JVNDB-2018-005127date:2018-07-06T00:00:00
db:PACKETSTORMid:147636date:2018-05-15T09:32:22
db:CNNVDid:CNNVD-201805-416date:2018-05-15T00:00:00
db:NVDid:CVE-2018-10990date:2018-05-14T14:29:00.350