First published: Sun Sep 03 2017(Updated: )
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG599 device, when IP Passthrough mode is not used, configures WAN access to a caserver https service with the tech account and an empty password, which allows remote attackers to obtain root privileges by establishing a session on port 49955 and then installing new software, such as BusyBox with "nc -l" support.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Att U-verse Firmware | =9.2.2h0d83 | |
Commscope Arris Nvg599 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14116 has a common vulnerability scoring system (CVSS) rating that indicates a high risk due to the potential for remote code execution.
To fix CVE-2017-14116, it is recommended to change the default settings of the AT&T U-verse device, particularly securing WAN access and updating firmware if an update is available.
CVE-2017-14116 affects the AT&T U-verse devices running firmware version 9.2.2h0d83.
CVE-2017-14116 exploits a misconfiguration that allows attackers to gain root privileges via a vulnerable HTTPS service.
As of the latest data, there have been reports of exploitation attempts targeting devices vulnerable to CVE-2017-14116.