First published: Mon Jul 31 2017(Updated: )
The Comcast firmware on Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices allows configuration changes via CSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Dpc3939b Firmware | =dpc3939b-v303r204217-150321a-cmcst | |
Cisco DPC3939B | ||
Arris Tg1682g Firmware | =10.0.132.sip.pc20.ct | |
Arris Tg1682g Firmware | =tg1682_2.2p7s2_prod_sey | |
Commscope Arris Tg1682g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9490 is classified as a moderate severity vulnerability due to its potential for unauthorized configuration changes.
To mitigate CVE-2017-9490, update the Arris TG1682G firmware to the latest version that addresses this CSRF vulnerability.
CVE-2017-9490 affects the Arris TG1682G device running firmware version 10.0.132.SIP.PC20.CT and TG1682_2.2p7s2_PROD_sey.
Yes, CVE-2017-9490 is a Cross-Site Request Forgery (CSRF) vulnerability that allows unauthorized configuration changes.
Implementing strict access controls and ensuring the device firmware is up-to-date can help prevent the exploitation of CVE-2017-9490.