Vulnerability Description
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to obtain root access to the Network Processor (NP) Linux system by enabling a TELNET daemon (through CVE-2017-9479 exploitation) and then establishing a TELNET session.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Dpc3939 Firmware | dpc3939-p20-18-v303r20421746-170221a-cmcst |
| Cisco | Dpc3939 | - |
Related Weaknesses (CWE)
References
- https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastilleExploitThird Party Advisory
- https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastilleExploitThird Party Advisory
FAQ
What is CVE-2017-9482?
CVE-2017-9482 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to obtain root access to the Network Processor (NP) Linux system by ...
How severe is CVE-2017-9482?
CVE-2017-9482 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-9482?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Dpc3939 Firmware, Cisco Dpc3939.