Vulnerability Description
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) and DPC3941T (firmware version DPC3941_2.5s3_PROD_sey) devices allows remote attackers to access the web UI by establishing a session to the wan0 WAN IPv6 address and then entering unspecified hardcoded credentials. This wan0 interface cannot be accessed from the public Internet.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Dpc3939 Firmware | dpc3939-p20-18-v303r20421746-170221a-cmcst |
| Cisco | Dpc3939 | - |
| Cisco | Dpc3941T Firmware | dpc3941_2.5s3_prod_sey |
| Cisco | Dpc3941T | - |
Related Weaknesses (CWE)
References
- https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastilleExploitThird Party Advisory
- https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastilleExploitThird Party Advisory
FAQ
What is CVE-2017-9488?
CVE-2017-9488 is a vulnerability with a CVSS score of 8.8 (HIGH). The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) and DPC3941T (firmware version DPC3941_2.5s3_PROD_sey) devices allows remote attackers to access the...
How severe is CVE-2017-9488?
CVE-2017-9488 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9488?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Dpc3939 Firmware, Cisco Dpc3939, Cisco Dpc3941T Firmware, Cisco Dpc3941T.