Remote Code Execution Vulnerability in Cisco DPC3939 Firmware by Comcast
CVE-2017-9485
7.5HIGH
Summary
The firmware on Comcast's Cisco DPC3939 devices has a significant vulnerability that allows remote attackers to manipulate session data. By exploiting the device's UI development mode, attackers can write arbitrary data to the /var/tmp/sess_* files, potentially leading to unauthorized access and control over the device. This highlights the importance of securing firmware and device settings to prevent unauthorized manipulation.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved