4 results (0.009 seconds)

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

Comcast XFINITY WiFi Home Hotspot devices allow remote attackers to spoof the identities of Comcast customers via a forged MAC address. Los dispositivos WiFi Home Hotspot de Comcast XFINITY permiten a los atacantes remotos suplantar las identidades de los clientes de Comcast por medio de una dirección MAC falsificada. • https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-17.public-wifi-theft-impersonation.txt • CWE-287: Improper Authentication •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) and Xfinity XR11-20 Voice Remote devices allows local users to upload arbitrary firmware images to an XR11 by leveraging root access. In other words, there is no protection mechanism involving digital signatures for the firmware. El firmware Comcast en los dispositivos Motorola MX011ANM (versión de firmware MX011AN_2.9p6s1_PROD_sey) y Xfinity XR11-20 Voice Remote, permite a los usuarios locales cargar imágenes de firmware arbitrarias en un XR11 aprovechando el acceso root. En otras palabras, no existe un mecanismo de protección que incluya firmas digitales para el firmware. • https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-42.remote-OTA.txt • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Comcast XFINITY Home Security System does not properly maintain base-station communication, which allows physically proximate attackers to defeat sensor functionality by interfering with ZigBee 2.4 GHz transmissions. Comcast XFINITY Home Security System no mantiene correctamente la comunicación con la estación base, lo que permite a atacantes físicamente próximos vencer la funcionalidad del sensor interfiriendo con las transmisiones ZigBee 2.4 GHz. • http://www.kb.cert.org/vuls/id/418072 http://www.wired.com/2016/01/xfinitys-security-system-flaws-open-homes-to-thieves https://community.rapid7.com/community/infosec/blog/2016/01/05/r7-2015-23-comcast-xfinity-home-security-system-insecure-fail-open • CWE-254: 7PK - Security Features •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

The XFINITY Constant Guard Mobile (aka com.whitesky.mobile.android) application 3.1.140603 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. La aplicación XFINITY Constant Guard Mobile (también conocido como com.whitesky.mobile.android) 3.1.140603 para Android no verifica los certificados X.509 de los servidores SSL, lo que permite a atacantes man-in-the-middle falsificar servidores y obtener información sensible a través de un certificado manipulado. • http://www.kb.cert.org/vuls/id/582497 http://www.kb.cert.org/vuls/id/743801 https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing • CWE-310: Cryptographic Issues •