var-202001-0738
Vulnerability from variot
Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11. plural Broadcom The base cable modem contains a classic buffer overflow vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Sagemcom F@st 5260 and Sagemcom F@st 3890 are routers. Technicolor TC7230 STEB is a wireless router
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0738", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tc7230 steb", "scope": "eq", "trust": 2.4, "vendor": "technicolor", "version": "01.25" }, { "model": "c6250emr", "scope": "eq", "trust": 1.6, "vendor": "netgear", "version": "2.01.05" }, { "model": "c6250emr", "scope": "eq", "trust": 1.6, "vendor": "netgear", "version": "2.01.03" }, { "model": "cg3700emr", "scope": "eq", "trust": 1.6, "vendor": "netgear", "version": "2.01.05" }, { "model": "cg3700emr", "scope": "eq", "trust": 1.6, "vendor": "netgear", "version": "2.01.03" }, { "model": "f\\@st 3890", "scope": "lt", "trust": 1.0, "vendor": "sagemcom", "version": "50.10.21_t4" }, { "model": "7284e", "scope": "eq", "trust": 1.0, "vendor": "compal", "version": "5.510.5.11" }, { "model": "f\\@st 3686", "scope": "eq", "trust": 1.0, "vendor": "sagemcom", "version": "3.428.0" }, { "model": "f\\@st 3890", "scope": "lt", "trust": 1.0, "vendor": "sagemcom", "version": "05.76.6.3f" }, { "model": "7486e", "scope": "eq", "trust": 1.0, "vendor": "compal", "version": "5.510.5.11" }, { "model": "f\\@st 3686", "scope": "eq", "trust": 1.0, "vendor": "sagemcom", "version": "4.83.0" }, { "model": "f@st 3890", "scope": "lt", "trust": 0.8, "vendor": "sagemcom", "version": "05.76.6.3f" }, { "model": "7284e", "scope": "eq", "trust": 0.8, "vendor": "compal broadband", "version": "5.510.5.11" }, { "model": "7486e", "scope": "eq", "trust": 0.8, "vendor": "compal broadband", "version": "5.510.5.11" }, { "model": "f@st 3890", "scope": "eq", "trust": 0.8, "vendor": "sagemcom", "version": null }, { "model": "f@st 3890", "scope": "lt", "trust": 0.8, "vendor": "sagemcom", "version": "50.10.21_t4" }, { "model": "c6250emr", "scope": "eq", "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": "2.01.03" }, { "model": "c6250emr", "scope": "eq", "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": "2.01.05" }, { "model": "f@st 3686", "scope": "eq", "trust": 0.8, "vendor": "sagemcom", "version": "3.428.0" }, { "model": "cg3700emr", "scope": "eq", "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": "2.01.05" }, { "model": "cg3700emr", "scope": "eq", "trust": 0.8, "vendor": "\u30cd\u30c3\u30c8\u30ae\u30a2", "version": "2.01.03" }, { "model": "f@st 3686", "scope": "eq", "trust": 0.8, "vendor": "sagemcom", "version": "4.83.0" }, { "model": "f@st \u003c50.10.21 t4", "scope": "eq", "trust": 0.6, "vendor": "sagemcom", "version": "3890" }, { "model": "f@st \u003c05.76.6.3f", "scope": "eq", "trust": 0.6, "vendor": "sagemcom", "version": "3890" }, { "model": "f@st", "scope": "eq", "trust": 0.6, "vendor": "sagemcom", "version": "36863.428.0" }, { "model": "f@st", "scope": "eq", "trust": 0.6, "vendor": "sagemcom", "version": "36864.83.0" }, { "model": "compal 7486e", "scope": "eq", "trust": 0.6, "vendor": "technicolor", "version": "5.510.5.11" }, { "model": "compal 7284e", "scope": "eq", "trust": 0.6, "vendor": "technicolor", "version": "5.510.5.11" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-23485" }, { "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "db": "NVD", "id": "CVE-2019-19494" } ] }, "cve": "CVE-2019-19494", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2019-19494", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2020-23485", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-19494", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-19494", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-19494", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-19494", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-23485", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202001-311", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-19494", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-23485" }, { "db": "VULMON", "id": "CVE-2019-19494" }, { "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "db": "CNNVD", "id": "CNNVD-202001-311" }, { "db": "NVD", "id": "CVE-2019-19494" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim\u0027s browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11. plural Broadcom The base cable modem contains a classic buffer overflow vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Sagemcom F@st 5260 and Sagemcom F@st 3890 are routers. Technicolor TC7230 STEB is a wireless router", "sources": [ { "db": "NVD", "id": "CVE-2019-19494" }, { "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "db": "CNVD", "id": "CNVD-2020-23485" }, { "db": "VULMON", "id": "CVE-2019-19494" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-19494", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2019-014302", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-23485", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202001-311", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-19494", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-23485" }, { "db": "VULMON", "id": "CVE-2019-19494" }, { "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "db": "CNNVD", "id": "CNNVD-202001-311" }, { "db": "NVD", "id": "CVE-2019-19494" } ] }, "id": "VAR-202001-0738", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-23485" } ], "trust": 1.2474206366666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-23485" } ] }, "last_update_date": "2024-11-23T21:59:31.876000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.broadcom.com/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2020/01/10/broadcom_cable_haunt_vulnerability/" }, { "title": "welivesecurity", "trust": 0.1, "url": "https://www.welivesecurity.com/2020/01/14/millions-modems-vulnerable-remote-hijacking/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cable-haunt-remote-code-execution/151756/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-19494" }, { "db": "JVNDB", "id": "JVNDB-2019-014302" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "db": "NVD", "id": "CVE-2019-19494" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://github.com/lyrebirds/cable-haunt-report/releases/download/2.4/report.pdf" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19494" }, { "trust": 1.7, "url": "https://cablehaunt.com" }, { "trust": 1.7, "url": "https://www.broadcom.com" }, { "trust": 1.7, "url": "https://github.com/lyrebirds/fast8690-exploit" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/cable-haunt-remote-code-execution/151756/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-23485" }, { "db": "VULMON", "id": "CVE-2019-19494" }, { "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "db": "CNNVD", "id": "CNNVD-202001-311" }, { "db": "NVD", "id": "CVE-2019-19494" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-23485" }, { "db": "VULMON", "id": "CVE-2019-19494" }, { "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "db": "CNNVD", "id": "CNNVD-202001-311" }, { "db": "NVD", "id": "CVE-2019-19494" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-20T00:00:00", "db": "CNVD", "id": "CNVD-2020-23485" }, { "date": "2020-01-09T00:00:00", "db": "VULMON", "id": "CVE-2019-19494" }, { "date": "2020-02-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "date": "2020-01-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-311" }, { "date": "2020-01-09T13:15:10.993000", "db": "NVD", "id": "CVE-2019-19494" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-20T00:00:00", "db": "CNVD", "id": "CNVD-2020-23485" }, { "date": "2020-01-28T00:00:00", "db": "VULMON", "id": "CVE-2019-19494" }, { "date": "2020-02-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-014302" }, { "date": "2021-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202001-311" }, { "date": "2024-11-21T04:34:50.037000", "db": "NVD", "id": "CVE-2019-19494" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-311" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Broadcom\u00a0 -Based cable modem vulnerable to classical buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-014302" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202001-311" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.