First published: Sun Sep 03 2017(Updated: )
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589, NVG599, and unspecified other devices, when IP Passthrough mode is not used, configures an sbdc.ha WAN TCP service on port 61001 with the bdctest account and the bdctest password, which allows remote attackers to obtain sensitive information (such as the Wi-Fi password) by leveraging knowledge of a hardware identifier, related to the Bulk Data Collection (BDC) mechanism defined in Broadband Forum technical reports.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Att U-verse Firmware | =9.2.2h0d83 | |
Commscope Arris Nvg589 | ||
Commscope Arris Nvg599 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10793 is considered a medium severity vulnerability due to the potential for unauthorized access to sensitive information.
To fix CVE-2017-10793, disable the sbdc.ha WAN TCP service on port 61001 or change the default bdctest password if the service is necessary.
CVE-2017-10793 affects the AT&T U-verse firmware version 9.2.2h0d83 on Arris NVG589 and NVG599 devices.
Yes, CVE-2017-10793 can be exploited remotely due to the unauthorized access available via the TCP service.
The implications of CVE-2017-10793 include potential data breaches and unauthorized access to sensitive information through misconfigured services.