First published: Mon May 14 2018(Updated: )
Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of "password" for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging access to the local network. NOTE: one or more user's guides distributed by ISPs state "At a minimum, you should set a login password."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Commscope Arris Tg1682g Firmware | =9.1.103j6 | |
Commscope Arris Tg1682g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10989.
The title of the vulnerability is 'Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of 'password' for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging this default password.'
The severity of CVE-2018-10989 is medium with a severity value of 6.6.
Arris Touchstone Telephony Gateway TG1682G devices with firmware version 9.1.103J6 are affected by CVE-2018-10989.
The vulnerability can be exploited by remote attackers who leverage the default password ('password') for the admin account used over an unencrypted http://192.168.0.1 connection.