First published: Mon Jul 31 2017(Updated: )
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Dpc3939 Firmware | =dpc3939-p20-18-v303r20421733-160420a-cmcst | |
Cisco DPC3939 | ||
Cisco Dpc3939 Firmware | =dpc3939-p20-18-v303r20421746-170221a-cmcst | |
Cisco Dpc3939b Firmware | =dpc3939b-v303r204217-150321a-cmcst | |
Cisco DPC3939B | ||
Cisco Dpc3941t Firmware | =dpc3941_2.5s3_prod_sey | |
Cisco DPC3941T | ||
Commscope Arris Tg1682g Firmware | =10.0.132.sip.pc20.ct | |
Commscope Arris Tg1682g Firmware | =tg1682_2.2p7s2_prod_sey | |
Commscope Arris Tg1682g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.