First published: Mon Jul 31 2017(Updated: )
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to write arbitrary data to a known /var/tmp/sess_* pathname by leveraging the device's operation in UI dev mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Dpc3939 Firmware | =dpc3939-p20-18-v303r20421746-170221a-cmcst | |
Cisco DPC3939 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9485 is classified as a high-severity vulnerability due to its ability to allow remote attackers to write arbitrary data.
To fix CVE-2017-9485, it is recommended to update the Cisco DPC3939 firmware to a newer, secure version provided by the manufacturer.
CVE-2017-9485 specifically affects Cisco DPC3939 devices running firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST.
Yes, CVE-2017-9485 can be exploited remotely, allowing attackers to manipulate session files on vulnerable devices.
CVE-2017-9485 allows attackers to perform unauthorized data writes, potentially compromising device security.