First published: Mon Jul 31 2017(Updated: )
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to obtain root access to the Network Processor (NP) Linux system by enabling a TELNET daemon (through CVE-2017-9479 exploitation) and then establishing a TELNET session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Dpc3939 Firmware | =dpc3939-p20-18-v303r20421746-170221a-cmcst | |
Cisco DPC3939 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9482 has a high severity rating due to the potential for attackers to gain root access to vulnerable devices.
To fix CVE-2017-9482, disable the TELNET service or upgrade to a firmware version that does not allow remote root access.
CVE-2017-9482 affects Cisco DPC3939 devices running firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST.
Attackers can exploit CVE-2017-9482 to remotely gain root access by enabling a TELNET daemon on compromised devices.
Yes, CVE-2017-9482 is related to CVE-2017-9479, which is used to exploit the TELNET service that leads to the root access vulnerability.