First published: Sat Nov 21 2015(Updated: )
Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arris Na Model 862 Gw Mono Firmware | =ts070593c_073013 | |
Arris Na Model 862 Gw Mono Firmware | =ts0703128_100611 | |
Arris Na Model 862 Gw Mono Firmware | =ts0703135_112211 | |
Arris Na Model 862 Gw Mono Firmware | =ts0705125_062314 | |
Arris Na Model 862 Gw Mono Firmware | =ts0705125d_031115 | |
Arris DG860A | ||
Arris Tg862a | ||
Arris Tg862g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7289 has a medium severity rating due to the potential for unauthorized remote access.
To fix CVE-2015-7289, update the firmware of the Arris devices to a version that does not use a hardcoded administrator password.
CVE-2015-7289 affects Arris DG860A, TG862A, and TG862G devices with specific firmware versions.
Attackers can gain unauthorized access via the web management interface, SSH, TELNET, or SNMP due to CVE-2015-7289.
There is no effective workaround for CVE-2015-7289; updating the firmware is the only recommended solution.