First published: Thu Jun 19 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in goform/RgDdns in ARRIS (formerly Motorola) SBG901 SURFboard Wireless Cable Modem allow remote attackers to hijack the authentication of administrators for requests that (1) change the dns service via the DdnsService parameter, (2) change the username via the DdnsUserName parameter, (3) change the password via the DdnsPassword parameter, or (4) change the host name via the DdnsHostName parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Commscope Arris Sbg901 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3778 is classified as a medium severity vulnerability due to the potential for unauthorized actions on an affected system.
To fix CVE-2014-3778, update the firmware of the ARRIS SBG901 modem to the latest version provided by the manufacturer.
CVE-2014-3778 affects the ARRIS SBG901 Wireless Cable Modem, specifically its goform/RgDdns functionality.
Yes, CVE-2014-3778 can allow remote attackers to hijack administrative authentication, potentially leading to unauthorized access.
Yes, there are known exploits for CVE-2014-3778 that demonstrate how the vulnerabilities can be exploited to manipulate the device settings.