Описание
Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP.
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts070593c_073013:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0703128_100611:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0703135_112211:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0705125_062314:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0705125d_031115:*:*:*:*:*:*:*
Одно из
cpe:2.3:h:arris:dg860a:*:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg862a:*:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg862g:*:*:*:*:*:*:*:*
EPSS
Процентиль: 59%
0.00376
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-255
Связанные уязвимости
github
больше 3 лет назад
Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP.
EPSS
Процентиль: 59%
0.00376
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-255