VARIoT IoT vulnerabilities database
| VAR-201707-1041 | CVE-2017-9476 | Cisco DPC3939 and Arris TG1682G Vulnerable to information disclosure |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices makes it easy for remote attackers to determine the hidden SSID and passphrase for a Home Security Wi-Fi network. Cisco DPC3939 and Arris TG1682G Contains an information disclosure vulnerability.Information may be obtained. The Cisco DPC3939 is a wireless voice gateway product from Cisco. A security vulnerability exists in the Cisco DPC3939 firmware. The remote attacker hides the SSID and the password of the home security Wi-Fi network. Arris TG1682G is a Modem (modem) router all-in-one device produced by the Arris Group of the United States. A remote attacker could exploit this vulnerability to determine hidden SSIDs and passwords
| VAR-201707-1042 | CVE-2017-9477 | Cisco DPC3939 Vulnerable to information disclosure |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST) and DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to discover the CM MAC address by connecting to the device's xfinitywifi hotspot. Cisco DPC3939 Contains an information disclosure vulnerability.Information may be obtained. The Cisco DPC3939 is a wireless voice gateway product from Cisco. A security vulnerability exists in the Cisco DPC3939 firmware. Comcast is a set of firmware developed by Comcast Corporation of the United States that runs in devices such as gateways and modems
| VAR-201707-1043 | CVE-2017-9478 | Cisco DPC3939 Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST) and DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices sets the CM MAC address to a value with a two-byte offset from the MTA/VoIP MAC address, which indirectly allows remote attackers to discover hidden Home Security Wi-Fi networks by leveraging the embedding of the MTA/VoIP MAC address into the DNS hostname. Cisco DPC3939 Contains an information disclosure vulnerability.Information may be obtained. The Cisco DPC3939 is a wireless voice gateway product from Cisco. A security vulnerability exists in the Cisco DPC3939 firmware. Comcast is a set of US Comcast ( Comcast ) company developed firmware
| VAR-201707-1045 | CVE-2017-9480 | Cisco DPC3939 Vulnerable to information disclosure |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows local users (e.g., users who have command access as a consequence of CVE-2017-9479 exploitation) to read arbitrary files via UPnP access to /var/IGD/. Cisco DPC3939 Contains an information disclosure vulnerability.Information may be obtained. The Cisco DPC3939 is a wireless voice gateway product from Cisco. A security vulnerability exists in the Cisco DPC3939 firmware. Allows an attacker to exploit the vulnerability to launch an application (BastilleTrackingNumber22) on the gateway to read arbitrary files. Comcast is a set of firmware developed by Comcast Corporation of the United States that runs in devices such as gateways and modems
| VAR-201707-1046 | CVE-2017-9481 | Cisco DPC3939 Access control vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to obtain unintended access to the Network Processor (NP) 169.254/16 IP network by adding a routing-table entry that specifies the LAN IP address as the router for that network. Cisco DPC3939 Contains an access control vulnerability.Information may be tampered with. The Cisco DPC3939 is a wireless voice gateway product from Cisco. A security vulnerability exists in the Cisco DPC3939 firmware. Allows an attacker to communicate with the internal network interface of a network processor (Atom) Linux instance. Comcast is a set of firmware developed by Comcast Corporation of the United States that runs in devices such as gateways and modems
| VAR-201707-1044 | CVE-2017-9479 | Cisco DPC3939 Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to execute arbitrary commands as root by leveraging local network access and connecting to the syseventd server, as demonstrated by copying configuration data into a readable filesystem. Cisco DPC3939 Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco DPC3939 is a wireless voice gateway product from Cisco. Cisco DPC3939 Firmware Security Vulnerability. Comcast is a set of firmware developed by Comcast Corporation of the United States that runs in devices such as gateways and modems
| VAR-201804-1055 | CVE-2017-7005 |
plural Apple Product JavaScriptCore Vulnerability in arbitrary code execution in components
Related entries in the VARIoT exploits database: VAR-E-201706-0097 |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. tvOS before 10.2.1 is affected. The issue involves the "JavaScriptCore" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. WebKit is prone to a remote code-execution vulnerability. Failed exploit attempts will likely cause a denial-of-service condition. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome
| VAR-201807-0266 | CVE-2017-3217 | CalAmp LMU-3030 devices may not authenticate SMS interface |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
CalAmp LMU 3030 series OBD-II CDMA and GSM devices has an SMS (text message) interface that can be deployed where no password is configured for this interface by the integrator / reseller. This interface must be password protected, otherwise, the attacker only needs to know the phone number of the device (via an IMSI Catcher, for example) to send administrative commands to the device. These commands can be used to provide ongoing, real-time access to the device and can configure parameters such as IP addresses, firewall rules, and passwords. For discovered cases, password setting and SMS Correspondence such as invalidation of interface is performed. Lack of authentication for critical functions (CWE-306) - CVE-2017-3217 CalAmp LMU 3030 Series provides telematics information for vehicle management OBD-II One of the devices. can be set. SMS If no password is set for the interface, IMSI Catcher It may be attacked by a remote party who obtained the phone number of the device.Vehicle GPS Coordinates, car orientation, speed, and maintenance information may be accessed. Also, an old version of firmware is rewritten by a remote third party into firmware that contains malicious code, CAN An attack on the bus may be carried out. CalAmp LMU-3030 devices are prone to an authentication-bypass vulnerability.
An attacker can exploit this issue to bypass authentication mechanism and perform unauthorized actions. This may lead to further attacks. CalAmp LMU-3030 is a GPS tracking device produced by CalAmp in the United States. Authentication bypass vulnerabilities exist in the CalAmp LMU-3030 OBD-II version, CDMA version, and GSM version
| VAR-201707-1012 | CVE-2017-9486 | Cisco DPC3939 Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to compute password-of-the-day values via unspecified vectors. Cisco DPC3939 Contains an information disclosure vulnerability.Information may be obtained. The Cisco DPC3939 (XB3) is a wireless home voice gateway product from Cisco. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A remote attacker can exploit this vulnerability to calculate the value of POTD (password-of-the-day)
| VAR-201707-1013 | CVE-2017-9487 | Cisco DPC3939 and DPC3941T Vulnerable to information disclosure |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) and DPC3941T (firmware version DPC3941_2.5s3_PROD_sey) devices allows remote attackers to discover a WAN IPv6 IP address by leveraging knowledge of the CM MAC address. Cisco DPC3939 and DPC3941T Contains an information disclosure vulnerability.Information may be obtained. The Cisco DPC3939 and DPC3941T are both Cisco Wireless Voice Gateway products. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A security vulnerability exists in the Cisco DPC3939 using the dpc3939-P20-18-v303r20421746-170221a-CMCST firmware and the Comcast firmware in the DPC3941T using the DPC3941_2.5s3_PROD_sey firmware. A remote attacker could exploit this vulnerability to obtain a WANIPv6 IP address
| VAR-201707-1014 | CVE-2017-9488 | Cisco DPC3939 and DPC3941T Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) and DPC3941T (firmware version DPC3941_2.5s3_PROD_sey) devices allows remote attackers to access the web UI by establishing a session to the wan0 WAN IPv6 address and then entering unspecified hardcoded credentials. This wan0 interface cannot be accessed from the public Internet. Cisco DPC3939 and DPC3941T Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco DPC3939 and DPC3941T are both Cisco Wireless Voice Gateway products. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A security vulnerability exists in the Cisco DPC3939 using the dpc3939-P20-18-v303r20421746-170221a-CMCST firmware and the Comcast firmware in the DPC3941T using the DPC3941_2.5s3_PROD_sey firmware. A remote attacker could exploit the vulnerability to access the WebUI with a hard-coded certificate
| VAR-201707-1015 | CVE-2017-9489 | Cisco DPC3939B Comcast Firmware Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
The Comcast firmware on Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST) devices allows configuration changes via CSRF. Cisco DPC3939B Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Cisco DPC3939B is a wireless voice gateway product from Cisco. A remote attacker can exploit this vulnerability to change the configuration
| VAR-201707-1016 | CVE-2017-9490 | Arris TG1682G Comcast Firmware Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
The Comcast firmware on Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices allows configuration changes via CSRF. Arris TG1682G Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The ArrisTG1682G is a modem product from Arris, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A remote attacker can exploit this vulnerability to change the configuration
| VAR-201707-1017 | CVE-2017-9491 | plural Cisco DPC Products and Arris TG1682G Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not set the secure flag for cookies in an https session to an administration application, which makes it easier for remote attackers to capture these cookies by intercepting their transmission within an http session. plural Cisco DPC Products and Arris TG1682G Contains an information disclosure vulnerability.Information may be obtained. Cisco DPC3939 (XB3) and so on are Cisco's wireless home voice gateway products. The ArrisTG1682G is a modem product from Arris, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. There are security holes in the Comcast firmware in several products. A remote attacker can exploit this vulnerability to take a screenshot of a cookie
| VAR-201707-1018 | CVE-2017-9492 | plural Cisco DPC Products and Arris TG1682G Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies. plural Cisco DPC Products and Arris TG1682G Contains an information disclosure vulnerability.Information may be obtained. Cisco DPC3939 (XB3) and so on are Cisco's wireless home voice gateway products. The ArrisTG1682G is a modem product from Arris, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. There are security holes in the Comcast firmware in several products. A remote attacker can exploit this vulnerability to obtain sensitive information
| VAR-201707-1019 | CVE-2017-9493 | Motorola MX011ANM Access control vulnerability |
CVSS V2: 5.8 CVSS V3: 6.3 Severity: MEDIUM |
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows remote attackers to conduct successful forced-pairing attacks (between an RF4CE remote and a set-top box) by repeatedly transmitting the same pairing code. Motorola MX011ANM Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MotorolaMX011ANM is a network set-top box device from Motorola, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A security vulnerability exists in the Comcast firmware in the MotorolaMX011ANM using the firmware version MX011AN_2.9p6s1_PROD_sey. A remote attacker can exploit this vulnerability to commit a mandatory pairing attack by repeatedly submitting the same pairing code
| VAR-201707-1020 | CVE-2017-9494 | Motorola MX011ANM Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows remote attackers to enable a Remote Web Inspector that is accessible from the public Internet. Motorola MX011ANM Contains vulnerabilities related to authorization, permissions, and access control.Information may be tampered with. MotorolaMX011ANM is a network set-top box device from Motorola, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A security vulnerability exists in the Comcast firmware in the MotorolaMX011ANM using the firmware version MX011AN_2.9p6s1_PROD_sey. A remote attacker could exploit this vulnerability to open the RemoteWebInspector
| VAR-201707-1021 | CVE-2017-9495 | Motorola MX011ANM Vulnerable to information disclosure |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows physically proximate attackers to read arbitrary files by pressing "EXIT, Down, Down, 2" on an RF4CE remote to reach the diagnostic display, and then launching a Remote Web Inspector script. Motorola MX011ANM Contains an information disclosure vulnerability.Information may be obtained. MotorolaMX011ANM is a network set-top box device from Motorola, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A security vulnerability exists in the Comcast firmware in the MotorolaMX011ANM using the firmware version MX011AN_2.9p6s1_PROD_sey. An attacker with a physical location nearby can exploit the vulnerability to read arbitrary files
| VAR-201707-1022 | CVE-2017-9496 | Motorola MX011ANM Access control vulnerability |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows physically proximate attackers to access an SNMP server by connecting a cable to the Ethernet port, and then establishing communication with the device's link-local IPv6 address. Motorola MX011ANM Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MotorolaMX011ANM is a network set-top box device from Motorola, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A security vulnerability exists in the Comcast firmware in the MotorolaMX011ANM using the firmware version MX011AN_2.9p6s1_PROD_sey. An attacker with a physical location is available to access the SNMP server
| VAR-201707-1023 | CVE-2017-9497 | Motorola MX011ANM Input validation vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows physically proximate attackers to execute arbitrary commands as root by pulling up the diagnostics menu on the set-top box, and then posting to a Web Inspector route. Motorola MX011ANM Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MotorolaMX011ANM is a network set-top box device from Motorola, USA. Comcast is a firmware developed by Comcast, Inc., which runs on devices such as gateways and modems. A security vulnerability exists in the Comcast firmware in the MotorolaMX011ANM using the firmware version MX011AN_2.9p6s1_PROD_sey. An attacker with a physical location nearby can exploit the vulnerability to execute arbitrary code with root privileges