8.1
CWE
200
Advisory Published
Updated

CVE-2017-10793: Infoleak

First published: Sun Sep 03 2017(Updated: )

The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589, NVG599, and unspecified other devices, when IP Passthrough mode is not used, configures an sbdc.ha WAN TCP service on port 61001 with the bdctest account and the bdctest password, which allows remote attackers to obtain sensitive information (such as the Wi-Fi password) by leveraging knowledge of a hardware identifier, related to the Bulk Data Collection (BDC) mechanism defined in Broadband Forum technical reports.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Att U-verse Firmware=9.2.2h0d83
Arris NVG589
Arris NVG599 Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2017-10793?

    CVE-2017-10793 is considered a medium severity vulnerability due to the potential for unauthorized access to sensitive information.

  • How do I fix CVE-2017-10793?

    To fix CVE-2017-10793, disable the sbdc.ha WAN TCP service on port 61001 or change the default bdctest password if the service is necessary.

  • What devices are affected by CVE-2017-10793?

    CVE-2017-10793 affects the AT&T U-verse firmware version 9.2.2h0d83 on Arris NVG589 and NVG599 devices.

  • Can CVE-2017-10793 be exploited remotely?

    Yes, CVE-2017-10793 can be exploited remotely due to the unauthorized access available via the TCP service.

  • What are the implications of CVE-2017-10793?

    The implications of CVE-2017-10793 include potential data breaches and unauthorized access to sensitive information through misconfigured services.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203