First published: Sun Sep 03 2017(Updated: )
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Att U-verse Firmware | =9.2.2h0d83 | |
Commscope Arris Nvg589 | ||
Commscope Arris Nvg599 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14115 is considered a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2017-14115, change the default password for the remotessh account and disable WAN SSH logins if they are not needed.
CVE-2017-14115 affects AT&T U-verse firmware version 9.2.2h0d83 on devices like the Arris NVG589 and NVG599.
The impact of CVE-2017-14115 is remote unauthorized access to the device's terminal shell, which can lead to further compromise.
CVE-2017-14115 is a remote vulnerability, allowing attackers to access the system without local access.