ID CVE-2011-0887
Summary The web management portal on the SMC SMCD3G-CCR (aka Comcast Business Gateway) with firmware before 1.4.0.49.2 uses predictable session IDs based on time values, which makes it easier for remote attackers to hijack sessions via a brute-force attack on the userid cookie.
References
Vulnerable Configurations
  • cpe:2.3:h:smc_networks:smcd3g-ccr:*:*:*:*:*:*:*:*
    cpe:2.3:h:smc_networks:smcd3g-ccr:*:*:*:*:*:*:*:*
  • cpe:2.3:a:smc_networks:smcd3g-ccr_firmware:1.4.0.42:*:*:*:*:*:*:*
    cpe:2.3:a:smc_networks:smcd3g-ccr_firmware:1.4.0.42:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 09-10-2018 - 19:29)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
bid 46215
bugtraq
  • 20110204 TWSL2011-002:Vulnerabilities in Comcast DOCSIS 3.0 Business Gateways (SMCD3G-CCR)
  • 20110205 TWSL2011-002:Vulnerabilities in Comcast DOCSIS 3.0 Business Gateways (SMCD3G-CCR)
exploit-db 16123
misc https://www.trustwave.com/spiderlabs/advisories/TWSL2011-002.txt
secunia 43199
sreason 8068
xf smcd3gccr-weak-security(65186)
Last major update 09-10-2018 - 19:29
Published 08-02-2011 - 22:00
Last modified 09-10-2018 - 19:29
Back to Top