First published: Mon Jul 31 2017(Updated: )
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) and DPC3941T (firmware version DPC3941_2.5s3_PROD_sey) devices allows remote attackers to access the web UI by establishing a session to the wan0 WAN IPv6 address and then entering unspecified hardcoded credentials. This wan0 interface cannot be accessed from the public Internet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Dpc3939 Firmware | =dpc3939-p20-18-v303r20421746-170221a-cmcst | |
Cisco DPC3939 | ||
Cisco Dpc3941t Firmware | =dpc3941_2.5s3_prod_sey | |
Cisco DPC3941T |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9488 is considered a high severity vulnerability due to the potential for remote unauthorized access to sensitive interfaces.
To fix CVE-2017-9488, update the firmware of affected Cisco DPC3939 and DPC3941T devices to the latest version provided by Cisco.
CVE-2017-9488 affects Cisco DPC3939 boards running firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST and Cisco DPC3941T boards running firmware version DPC3941_2.5s3_PROD_sey.
CVE-2017-9488 allows remote attackers to access the web user interface by exploiting session management flaws to connect to the wan0 WAN IPv6 address.
Mitigation for CVE-2017-9488 without a firmware update is limited, but ensuring strong network security practices can help reduce risk.