CVE-2017-9476
https://notcve.org/view.php?id=CVE-2017-9476
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices makes it easy for remote attackers to determine the hidden SSID and passphrase for a Home Security Wi-Fi network. El firmware de Comcast en los dispositivos Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421746-170221a-CMCST); y Arris TG1682G (eMTA&DOCSIS.CT versión 10.0.132.SIP.PC20.CT, versión de software TG1682_2.2p7s2_PROD_sey), facilitan a los atacantes remotos determinar el SSID oculto y la frase de contraseña para una red Wi-Fi de Home Security. • https://github.com/wiire-a/CVE-2017-9476 https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-18.home-security-wifi-network.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2017-9478
https://notcve.org/view.php?id=CVE-2017-9478
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST) and DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices sets the CM MAC address to a value with a two-byte offset from the MTA/VoIP MAC address, which indirectly allows remote attackers to discover hidden Home Security Wi-Fi networks by leveraging the embedding of the MTA/VoIP MAC address into the DNS hostname. El firmware de Comcast en Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421733-160420a-CMCST) y DPC3939 (DPC3939 (DPC3939 ( versión de firmware dpc3939-P20-18-v303r20421746-170221a-CMCST), establece la dirección MAC CM en un valor con un offset de dos bytes de la Dirección MAC MTA/VoIP, que indirectamente permite a los atacantes remotos detectar redes Wi-Fi ocultas de Home Security mediante el aprovechamiento de la inserción de la dirección MAC MTA/VoIP en el nombre de host DNS. • https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-20.emta-reverse-dns.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2017-9477
https://notcve.org/view.php?id=CVE-2017-9477
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST) and DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to discover the CM MAC address by connecting to the device's xfinitywifi hotspot. El firmware de Comcast en los dispositivos Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421733-160420a-CMCST) y DPC3939 (versión de firmware dpc3939-P20-18-v303r20421746-170221a-CMCST), permite a los atacantes remotos detectar la dirección MAC CM mediante la conexión al hotspot xfinitywifi del dispositivo. • https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-19.wifi-dhcp-cm-mac-leak.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2017-9484
https://notcve.org/view.php?id=CVE-2017-9484
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST) and DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to discover a CM MAC address by sniffing Wi-Fi traffic and performing simple arithmetic calculations. El firmware Comcast en los dispositivos DPC3939 (versión de firmware dpc3939-P20-18-v303r20421733-160420a-CMCST) y DPC3939 (versión de firmware dpc3939-P20-18-v303r20421746-170221a-CMCST) de Cisco, permite a los atacantes remotos detectar una dirección MAC CM mediante el espiado del tráfico de Wi Fi y el desarrollo de cálculos aritméticos sencillos. • https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-27.ipv6-cm-mac-leak.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2017-9492
https://notcve.org/view.php?id=CVE-2017-9492
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies. El firmware Comcast en los dispositivos Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (versión de firmware dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (versión de firmware DPC3941_2.5s3_PROD_sey); y Arris TG1682G (versión 10.0.132.SIP.PC20.CT de eMTA y DOCSIS, versión de software TG1682_2.2p7s2_PROD_sey), no incluye la flag HTTPOnly en el encabezado Set-Cookie para aplicaciones de administración, lo que hace que sea más fácil para los atacantes remotos obtener potencialmente información confidencial mediante un script de acceso a las cookies. • https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-35.improper-cookie-flags.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •