First published: Mon Jul 31 2017(Updated: )
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) and DPC3941T (firmware version DPC3941_2.5s3_PROD_sey) devices allows remote attackers to discover a WAN IPv6 IP address by leveraging knowledge of the CM MAC address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DPC3939 Wireless Residential Voice Gateway Firmware | =dpc3939-p20-18-v303r20421746-170221a-cmcst | |
Cisco DPC3939B Firmware | ||
Cisco DPC3941T Firmware | =dpc3941_2.5s3_prod_sey | |
Cisco DPC3941T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-9487 is considered medium due to the potential for information disclosure.
To fix CVE-2017-9487, upgrade to a firmware version that addresses this vulnerability.
CVE-2017-9487 affects Cisco DPC3939 devices with firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST and DPC3941T with firmware version DPC3941_2.5s3_PROD_sey.
Yes, CVE-2017-9487 can be exploited remotely by attackers who know the CM MAC address.
CVE-2017-9487 allows remote attackers to discover a WAN IPv6 IP address.