// For flags

CVE-2017-9492

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies.

El firmware Comcast en los dispositivos Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (versión de firmware dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (versión de firmware DPC3941_2.5s3_PROD_sey); y Arris TG1682G (versión 10.0.132.SIP.PC20.CT de eMTA y DOCSIS, versión de software TG1682_2.2p7s2_PROD_sey), no incluye la flag HTTPOnly en el encabezado Set-Cookie para aplicaciones de administración, lo que hace que sea más fácil para los atacantes remotos obtener potencialmente información confidencial mediante un script de acceso a las cookies.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-06-07 CVE Reserved
  • 2017-07-31 CVE Published
  • 2024-05-21 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Dpc3939 Firmware
Search vendor "Cisco" for product "Dpc3939 Firmware"
dpc3939-p20-18-v303r20421733-160420a-cmcst
Search vendor "Cisco" for product "Dpc3939 Firmware" and version "dpc3939-p20-18-v303r20421733-160420a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939
Search vendor "Cisco" for product "Dpc3939"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3939 Firmware
Search vendor "Cisco" for product "Dpc3939 Firmware"
dpc3939-p20-18-v303r20421746-170221a-cmcst
Search vendor "Cisco" for product "Dpc3939 Firmware" and version "dpc3939-p20-18-v303r20421746-170221a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939
Search vendor "Cisco" for product "Dpc3939"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3939b Firmware
Search vendor "Cisco" for product "Dpc3939b Firmware"
dpc3939b-v303r204217-150321a-cmcst
Search vendor "Cisco" for product "Dpc3939b Firmware" and version "dpc3939b-v303r204217-150321a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939b
Search vendor "Cisco" for product "Dpc3939b"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3941t Firmware
Search vendor "Cisco" for product "Dpc3941t Firmware"
dpc3941_2.5s3_prod_sey
Search vendor "Cisco" for product "Dpc3941t Firmware" and version "dpc3941_2.5s3_prod_sey"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3941t
Search vendor "Cisco" for product "Dpc3941t"
--
Safe
Commscope
Search vendor "Commscope"
Arris Tg1682g Firmware
Search vendor "Commscope" for product "Arris Tg1682g Firmware"
10.0.132.sip.pc20.ct
Search vendor "Commscope" for product "Arris Tg1682g Firmware" and version "10.0.132.sip.pc20.ct"
-
Affected
in Commscope
Search vendor "Commscope"
Arris Tg1682g
Search vendor "Commscope" for product "Arris Tg1682g"
--
Safe
Commscope
Search vendor "Commscope"
Arris Tg1682g Firmware
Search vendor "Commscope" for product "Arris Tg1682g Firmware"
tg1682_2.2p7s2_prod_sey
Search vendor "Commscope" for product "Arris Tg1682g Firmware" and version "tg1682_2.2p7s2_prod_sey"
-
Affected
in Commscope
Search vendor "Commscope"
Arris Tg1682g
Search vendor "Commscope" for product "Arris Tg1682g"
--
Safe