Vulnerability Description
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to write arbitrary data to a known /var/tmp/sess_* pathname by leveraging the device's operation in UI dev mode.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Dpc3939 Firmware | dpc3939-p20-18-v303r20421746-170221a-cmcst |
| Cisco | Dpc3939 | - |
References
- https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastilleExploitThird Party Advisory
- https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastilleExploitThird Party Advisory
FAQ
What is CVE-2017-9485?
CVE-2017-9485 is a vulnerability with a CVSS score of 7.5 (HIGH). The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to write arbitrary data to a known /var/tmp/sess_* pathname by lever...
How severe is CVE-2017-9485?
CVE-2017-9485 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9485?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Dpc3939 Firmware, Cisco Dpc3939.