Improper Cookie Flag Handling in Cisco and Arris Network Devices
CVE-2017-9492
7.5HIGH
Summary
Certain models of Cisco and Arris network devices are vulnerable due to the absence of the HTTPOnly flag in the Set-Cookie header of their administration applications. This oversight allows remote attackers to exploit script access to cookies, potentially leading to the leakage of sensitive information. Users of affected versions need to be aware of this vulnerability and take appropriate measures to secure their devices.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved