First published: Mon May 14 2018(Updated: )
On Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices, a logout action does not immediately destroy all state on the device related to the validity of the "credential" cookie, which might make it easier for attackers to obtain access at a later time (e.g., "at least for a few minutes"). NOTE: there is no documentation stating that the web UI's logout feature was supposed to do anything beyond removing the cookie from one instance of a web browser; a client-side logout action is often not intended to address cases where a person has made a copy of a cookie outside of a browser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Commscope Arris Tg1682g Firmware | =9.1.103j6 | |
Commscope Arris Tg1682g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10990.
The severity of CVE-2018-10990 is high.
The Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are affected by CVE-2018-10990.
CVE-2018-10990 could make it easier for attackers to obtain access to the device at a later time.
There is no information provided about a fix for CVE-2018-10990.