ID |
CVE-2015-7289
|
Summary |
Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts070593c_073013:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts070593c_073013:*:*:*:*:*:*:*
-
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0703128_100611:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0703128_100611:*:*:*:*:*:*:*
-
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0703135_112211:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0703135_112211:*:*:*:*:*:*:*
-
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0705125_062314:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0705125_062314:*:*:*:*:*:*:*
-
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0705125d_031115:*:*:*:*:*:*:*
cpe:2.3:o:arris:na_model_862_gw_mono_firmware:ts0705125d_031115:*:*:*:*:*:*:*
-
cpe:2.3:h:arris:dg860a:*:*:*:*:*:*:*:*
cpe:2.3:h:arris:dg860a:*:*:*:*:*:*:*:*
-
cpe:2.3:h:arris:tg862a:*:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg862a:*:*:*:*:*:*:*:*
-
cpe:2.3:h:arris:tg862g:*:*:*:*:*:*:*:*
cpe:2.3:h:arris:tg862g:*:*:*:*:*:*:*:*
|
CVSS |
Base: | 9.3 (as of 23-11-2015 - 16:54) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-255 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
refmap
via4
|
|
Last major update |
23-11-2015 - 16:54 |
Published |
21-11-2015 - 11:59 |
Last modified |
23-11-2015 - 16:54 |