// For flags

CVE-2017-9491

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not set the secure flag for cookies in an https session to an administration application, which makes it easier for remote attackers to capture these cookies by intercepting their transmission within an http session.

El firmware Comcast en los dispositivos Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (versión de firmware dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (versión de firmware DPC3941_2.5s3_PROD_sey); y Arris TG1682G (eMTA & DOCSIS versión 10.0.132.SIP.PC20.CT, versión de software TG1682_2.2p7s2_PROD_sey), no establecen la flag secure para las cookies en una sesión https para una aplicación de administración, lo que hace más fácil para atacantes remotos capturar cookies interceptando su transmisión dentro de una sesión http.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-06-07 CVE Reserved
  • 2017-07-31 CVE Published
  • 2024-05-21 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Dpc3939 Firmware
Search vendor "Cisco" for product "Dpc3939 Firmware"
dpc3939-p20-18-v303r20421733-160420a-cmcst
Search vendor "Cisco" for product "Dpc3939 Firmware" and version "dpc3939-p20-18-v303r20421733-160420a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939
Search vendor "Cisco" for product "Dpc3939"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3939 Firmware
Search vendor "Cisco" for product "Dpc3939 Firmware"
dpc3939-p20-18-v303r20421746-170221a-cmcst
Search vendor "Cisco" for product "Dpc3939 Firmware" and version "dpc3939-p20-18-v303r20421746-170221a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939
Search vendor "Cisco" for product "Dpc3939"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3939b Firmware
Search vendor "Cisco" for product "Dpc3939b Firmware"
dpc3939b-v303r204217-150321a-cmcst
Search vendor "Cisco" for product "Dpc3939b Firmware" and version "dpc3939b-v303r204217-150321a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939b
Search vendor "Cisco" for product "Dpc3939b"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3941t Firmware
Search vendor "Cisco" for product "Dpc3941t Firmware"
dpc3941_2.5s3_prod_sey
Search vendor "Cisco" for product "Dpc3941t Firmware" and version "dpc3941_2.5s3_prod_sey"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3941t
Search vendor "Cisco" for product "Dpc3941t"
--
Safe
Commscope
Search vendor "Commscope"
Arris Tg1682g Firmware
Search vendor "Commscope" for product "Arris Tg1682g Firmware"
10.0.132.sip.pc20.ct
Search vendor "Commscope" for product "Arris Tg1682g Firmware" and version "10.0.132.sip.pc20.ct"
-
Affected
in Commscope
Search vendor "Commscope"
Arris Tg1682g
Search vendor "Commscope" for product "Arris Tg1682g"
--
Safe
Commscope
Search vendor "Commscope"
Arris Tg1682g Firmware
Search vendor "Commscope" for product "Arris Tg1682g Firmware"
tg1682_2.2p7s2_prod_sey
Search vendor "Commscope" for product "Arris Tg1682g Firmware" and version "tg1682_2.2p7s2_prod_sey"
-
Affected
in Commscope
Search vendor "Commscope"
Arris Tg1682g
Search vendor "Commscope" for product "Arris Tg1682g"
--
Safe