var-201511-0053
Vulnerability from variot
Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP. Multiple models of ARRIS cable modems contain multiple, deterministically generated backdoor passwords, as well as multiple cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities. Arris DG860A, TG862A and TG862G are modem products of the American Arris Group. A remote attacker can exploit the vulnerability to gain access through the web administration interface. A cross-site scripting vulnerability 2. A cross-site request-forgery vulnerability 3. Multiple security-bypass vulnerabilities An attacker can exploit these issues to bypass security restrictions and perform unauthorized actions, execute attacker-supplied HTML or JavaScript code in the context of the affected site or to steal cookie-based authentication credentials. This may aid in further attacks. The following products and versions are affected: Arris DG860A, TG862A, TG862G using firmware versions TS0703128_100611 to TS0705125D_031115
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0053", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "na model 862 gw mono", "scope": "eq", "trust": 1.6, "vendor": "arris", "version": "ts0703135_112211" }, { "model": "na model 862 gw mono", "scope": "eq", "trust": 1.6, "vendor": "arris", "version": "ts0705125d_031115" }, { "model": "na model 862 gw mono", "scope": "eq", "trust": 1.6, "vendor": "arris", "version": "ts070593c_073013" }, { "model": "na model 862 gw mono", "scope": "eq", "trust": 1.6, "vendor": "arris", "version": "ts0705125_062314" }, { "model": "na model 862 gw mono", "scope": "eq", "trust": 1.6, "vendor": "arris", "version": "ts0703128_100611" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "arris", "version": null }, { "model": "dg860a", "scope": null, "trust": 0.8, "vendor": "arris group", "version": null }, { "model": "na.model 862.gw.mono", "scope": "eq", "trust": 0.8, "vendor": "arris group", "version": "ts0703128_100611 to ts0705125d_031115" }, { "model": "tg862a", "scope": null, "trust": 0.8, "vendor": "arris group", "version": null }, { "model": "tg862g", "scope": null, "trust": 0.8, "vendor": "arris group", "version": null }, { "model": "dg860a ts0703128 100611 to ts0705125d 031115", "scope": null, "trust": 0.6, "vendor": "arris", "version": null }, { "model": "tg862a ts0703128 100611 to ts0705125d 031115", "scope": null, "trust": 0.6, "vendor": "arris", "version": null }, { "model": "tg862g ts0703128 100611 to ts0705125d 031115", "scope": null, "trust": 0.6, "vendor": "arris", "version": null }, { "model": "tg862g ts070593c 073013 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862g ts0705125d 031115 na", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862g ts0705125 062314 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862g ts0703135 112211 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862g ts0703128 100611 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862a ts070593c 073013 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862a ts0705125d 031115 na", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862a ts0705125 062314 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862a ts0703135 112211 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "tg862a ts0703128 100611 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "dg860a ts070593c 073013 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "dg860a ts0705125d 031115 na", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "dg860a ts0705125 062314 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "dg860a ts0703135 112211 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null }, { "model": "dg860a ts0703128 100611 na.", "scope": null, "trust": 0.3, "vendor": "arris", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#419568" }, { "db": "CNVD", "id": "CNVD-2015-07833" }, { "db": "BID", "id": "77674" }, { "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "db": "CNNVD", "id": "CNNVD-201511-382" }, { "db": "NVD", "id": "CVE-2015-7289" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:arris:dg860a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:arris:tg862a", "vulnerable": true }, { "cpe22Uri": "cpe:/h:arris:tg862g", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-006007" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Bernardo Rodrigues", "sources": [ { "db": "BID", "id": "77674" } ], "trust": 0.3 }, "cve": "CVE-2015-7289", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2015-7289", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2015-07833", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-85250", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-7289", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-7289", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-07833", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201511-382", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-85250", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07833" }, { "db": "VULHUB", "id": "VHN-85250" }, { "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "db": "CNNVD", "id": "CNNVD-201511-382" }, { "db": "NVD", "id": "CVE-2015-7289" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP. Multiple models of ARRIS cable modems contain multiple, deterministically generated backdoor passwords, as well as multiple cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities. Arris DG860A, TG862A and TG862G are modem products of the American Arris Group. A remote attacker can exploit the vulnerability to gain access through the web administration interface. A cross-site scripting vulnerability\n2. A cross-site request-forgery vulnerability\n3. Multiple security-bypass vulnerabilities\nAn attacker can exploit these issues to bypass security restrictions and perform unauthorized actions, execute attacker-supplied HTML or JavaScript code in the context of the affected site or to steal cookie-based authentication credentials. This may aid in further attacks. The following products and versions are affected: Arris DG860A, TG862A, TG862G using firmware versions TS0703128_100611 to TS0705125D_031115", "sources": [ { "db": "NVD", "id": "CVE-2015-7289" }, { "db": "CERT/CC", "id": "VU#419568" }, { "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "db": "CNVD", "id": "CNVD-2015-07833" }, { "db": "BID", "id": "77674" }, { "db": "VULHUB", "id": "VHN-85250" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#419568", "trust": 4.2 }, { "db": "NVD", "id": "CVE-2015-7289", "trust": 3.4 }, { "db": "EXPLOIT-DB", "id": "29131", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU90662356", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-006007", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-382", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-07833", "trust": 0.6 }, { "db": "BID", "id": "77674", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-85250", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#419568" }, { "db": "CNVD", "id": "CNVD-2015-07833" }, { "db": "VULHUB", "id": "VHN-85250" }, { "db": "BID", "id": "77674" }, { "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "db": "CNNVD", "id": "CNNVD-201511-382" }, { "db": "NVD", "id": "CVE-2015-7289" } ] }, "id": "VAR-201511-0053", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-07833" }, { "db": "VULHUB", "id": "VHN-85250" } ], "trust": 1.4555555666666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07833" } ] }, "last_update_date": "2024-11-23T22:13:22.321000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.arris.com/" }, { "title": "TG862G/CT", "trust": 0.8, "url": "http://arris.force.com/consumers/ConsumerProductDetail?p=a0ha000000GOZ3yAAH\u0026c=Touchstone%20Modems%20and%20Gateways" }, { "title": "Patches for multiple Arris device trust management vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/67321" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-07833" }, { "db": "JVNDB", "id": "JVNDB-2015-006007" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-85250" }, { "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "db": "NVD", "id": "CVE-2015-7289" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://www.kb.cert.org/vuls/id/419568" }, { "trust": 0.8, "url": "https://w00tsec.blogspot.com/2015/11/arris-cable-modem-has-backdoor-in.html" }, { "trust": 0.8, "url": "https://github.com/borfast/arrispwgen" }, { "trust": 0.8, "url": "https://www.shodan.io/search?query=arris+port%3a%2223%22" }, { "trust": 0.8, "url": "https://www.shodan.io/search?query=ssh-2.0-arris_0.50" }, { "trust": 0.8, "url": "https://www.shodan.io/search?query=net-dk" }, { "trust": 0.8, "url": "http://www.theregister.co.uk/2015/11/20/arris_modem_backdoor/" }, { "trust": 0.8, "url": "http://www.cert.br/docs/palestras/certbr-tcfirst2015.pdf" }, { "trust": 0.8, "url": "https://www.exploit-db.com/exploits/29131/" }, { "trust": 0.8, "url": "http://docsis.org/node/1575" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/255.html" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/259.html" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/80.html" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/352.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7289" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu90662356/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7289" }, { "trust": 0.3, "url": "http://www.arrisi.com/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#419568" }, { "db": "CNVD", "id": "CNVD-2015-07833" }, { "db": "VULHUB", "id": "VHN-85250" }, { "db": "BID", "id": "77674" }, { "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "db": "CNNVD", "id": "CNNVD-201511-382" }, { "db": "NVD", "id": "CVE-2015-7289" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#419568" }, { "db": "CNVD", "id": "CNVD-2015-07833" }, { "db": "VULHUB", "id": "VHN-85250" }, { "db": "BID", "id": "77674" }, { "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "db": "CNNVD", "id": "CNNVD-201511-382" }, { "db": "NVD", "id": "CVE-2015-7289" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-20T00:00:00", "db": "CERT/CC", "id": "VU#419568" }, { "date": "2015-11-27T00:00:00", "db": "CNVD", "id": "CNVD-2015-07833" }, { "date": "2015-11-21T00:00:00", "db": "VULHUB", "id": "VHN-85250" }, { "date": "2015-11-20T00:00:00", "db": "BID", "id": "77674" }, { "date": "2015-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "date": "2015-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-382" }, { "date": "2015-11-21T11:59:16.620000", "db": "NVD", "id": "CVE-2015-7289" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-23T00:00:00", "db": "CERT/CC", "id": "VU#419568" }, { "date": "2015-11-27T00:00:00", "db": "CNVD", "id": "CNVD-2015-07833" }, { "date": "2015-11-23T00:00:00", "db": "VULHUB", "id": "VHN-85250" }, { "date": "2015-11-20T00:00:00", "db": "BID", "id": "77674" }, { "date": "2015-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-006007" }, { "date": "2015-11-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-382" }, { "date": "2024-11-21T02:36:31.307000", "db": "NVD", "id": "CVE-2015-7289" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-382" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ARRIS cable modems generate passwords deterministically and contain XSS and CSRF vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#419568" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-382" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.