ID CVE-2018-10989
Summary Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of "password" for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging access to the local network. NOTE: one or more user's guides distributed by ISPs state "At a minimum, you should set a login password."
References
Vulnerable Configurations
  • cpe:2.3:o:commscope:arris_tg1682g_firmware:9.1.103j6:*:*:*:*:*:*:*
    cpe:2.3:o:commscope:arris_tg1682g_firmware:9.1.103j6:*:*:*:*:*:*:*
  • cpe:2.3:h:commscope:arris_tg1682g:-:*:*:*:*:*:*:*
    cpe:2.3:h:commscope:arris_tg1682g:-:*:*:*:*:*:*:*
CVSS
Base: 3.5 (as of 13-09-2021 - 11:32)
Impact:
Exploitability:
CWE CWE-1188
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:M/Au:S/C:P/I:N/A:N
refmap via4
misc https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c
Last major update 13-09-2021 - 11:32
Published 14-05-2018 - 14:29
Last modified 13-09-2021 - 11:32
Back to Top