First published: Mon Jul 31 2017(Updated: )
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to execute arbitrary commands as root by leveraging local network access and connecting to the syseventd server, as demonstrated by copying configuration data into a readable filesystem.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Dpc3939 Firmware | =dpc3939-p20-18-v303r20421746-170221a-cmcst | |
Cisco DPC3939 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9479 is considered a high-severity vulnerability due to the potential for remote attackers to execute arbitrary commands as root.
To mitigate CVE-2017-9479, update the Cisco DPC3939 firmware to a version that is not vulnerable to this exploit.
Users of the Cisco DPC3939 with the firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST are affected by CVE-2017-9479.
CVE-2017-9479 requires local network access to the affected device to successfully exploit the vulnerability.
Attackers can execute arbitrary commands with root privileges through the syseventd server if they successfully exploit CVE-2017-9479.