CVE-2018-10989Initialization of a Resource with an Insecure Default in Arris Tg1682g Firmware

Severity
6.6MEDIUMNVD
EPSS
0.4%
top 42.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 14
Latest updateMay 13

Description

Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of "password" for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging access to the local network. NOTE: one or more user's guides distributed by ISPs state "At a minimum, you should set a login password."

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.7 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-7vw7-45gr-9vpj: Arris Touchstone Telephony Gateway TG1682G 92022-05-13
CVEList
CVE-2018-10989: Arris Touchstone Telephony Gateway TG1682G 92018-05-14
CVE-2018-10989 — Arris Tg1682g Firmware vulnerability | cvebase