First published: Sun Sep 03 2017(Updated: )
The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures an unauthenticated proxy service on WAN TCP port 49152, which allows remote attackers to establish arbitrary TCP connections to intranet hosts by sending \x2a\xce\x01 followed by other predictable values.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Att U-verse Firmware | =9.2.2h0d83 | |
Commscope Arris Nvg589 | ||
Commscope Arris Nvg599 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14117 is classified as a medium severity vulnerability due to the potential for remote exploitation.
To fix CVE-2017-14117, it is recommended to disable the unauthenticated proxy service or update to a firmware version that mitigates this vulnerability.
CVE-2017-14117 affects the AT&T U-verse firmware version 9.2.2h0d83 used in Arris NVG589 and NVG599 devices.
Remote attackers can exploit CVE-2017-14117 by establishing arbitrary TCP connections to intranet hosts.
CVE-2017-14117 poses a risk when the AT&T U-verse devices are not using IP Passthrough mode.