// For flags

CVE-2017-9521

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices allows remote attackers to execute arbitrary code via a specific (but unstated) exposed service. NOTE: the scope of this CVE does NOT include the concept of "Unnecessary Services" in general; the scope is only a single service that is unnecessarily exposed, leading to remote code execution. The details of that service might be disclosed at a later date.

El firmware Comcast en los dispositivos Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (versión de firmware dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (versión de firmware dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (versión de firmware DPC3941_2.5s3_PROD_sey); y Arris TG1682G (eMTA & DOCSIS versión 10.0.132.SIP.PC20.CT, versión de software TG1682_2.2p7s2_PROD_sey), permiten a los atacantes remotos ejecutar código arbitrario por medio de un servicio expuesto específico (pero no declarado). NOTA: el alcance de este CVE NO incluye el concepto de "Unnecessary Services" en general; el alcance es solo un servicio que se expone innecesariamente, lo que conlleva a la ejecución de código remota. Los detalles de ese servicio pueden ser divulgados en una fecha posterior.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-06-08 CVE Reserved
  • 2017-07-31 CVE Published
  • 2024-03-03 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Dpc3939 Firmware
Search vendor "Cisco" for product "Dpc3939 Firmware"
dpc3939-p20-18-v303r20421733-160420a-cmcst
Search vendor "Cisco" for product "Dpc3939 Firmware" and version "dpc3939-p20-18-v303r20421733-160420a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939
Search vendor "Cisco" for product "Dpc3939"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3939 Firmware
Search vendor "Cisco" for product "Dpc3939 Firmware"
dpc3939-p20-18-v303r20421746-170221a-cmcst
Search vendor "Cisco" for product "Dpc3939 Firmware" and version "dpc3939-p20-18-v303r20421746-170221a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939
Search vendor "Cisco" for product "Dpc3939"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3939b Firmware
Search vendor "Cisco" for product "Dpc3939b Firmware"
dpc3939b-v303r204217-150321a-cmcst
Search vendor "Cisco" for product "Dpc3939b Firmware" and version "dpc3939b-v303r204217-150321a-cmcst"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3939b
Search vendor "Cisco" for product "Dpc3939b"
--
Safe
Cisco
Search vendor "Cisco"
Dpc3941t Firmware
Search vendor "Cisco" for product "Dpc3941t Firmware"
dpc3941_2.5s3_prod_sey
Search vendor "Cisco" for product "Dpc3941t Firmware" and version "dpc3941_2.5s3_prod_sey"
-
Affected
in Cisco
Search vendor "Cisco"
Dpc3941t
Search vendor "Cisco" for product "Dpc3941t"
--
Safe
Commscope
Search vendor "Commscope"
Arris Tg1682g Firmware
Search vendor "Commscope" for product "Arris Tg1682g Firmware"
10.0.132.sip.pc20.ct
Search vendor "Commscope" for product "Arris Tg1682g Firmware" and version "10.0.132.sip.pc20.ct"
-
Affected
in Commscope
Search vendor "Commscope"
Arris Tg1682g
Search vendor "Commscope" for product "Arris Tg1682g"
--
Safe
Commscope
Search vendor "Commscope"
Arris Tg1682g Firmware
Search vendor "Commscope" for product "Arris Tg1682g Firmware"
tg1682_2.2p7s2_prod_sey
Search vendor "Commscope" for product "Arris Tg1682g Firmware" and version "tg1682_2.2p7s2_prod_sey"
-
Affected
in Commscope
Search vendor "Commscope"
Arris Tg1682g
Search vendor "Commscope" for product "Arris Tg1682g"
--
Safe