Commscope Arris Tg1682G Firmware vulnerabilities

8 known vulnerabilities affecting commscope/arris_tg1682g_firmware.

Total CVEs
8
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH3MEDIUM4

Vulnerabilities

Page 1 of 1
CVE-2018-10990HIGHCVSS 8.0v9.1.103j62018-05-14
CVE-2018-10990 [HIGH] CWE-613 CVE-2018-10990: On Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices, a logout action does not immediatel On Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices, a logout action does not immediately destroy all state on the device related to the validity of the "credential" cookie, which might make it easier for attackers to obtain access at a later time (e.g., "at least for a few minutes"). NOTE: there is no documentation stating that the web UI
nvd
CVE-2018-10989MEDIUMCVSS 6.6v9.1.103j62018-05-14
CVE-2018-10989 [MEDIUM] CWE-1188 CVE-2018-10989: Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a def Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of "password" for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging access to the local network. NOTE: one or more u
nvd
CVE-2017-16836MEDIUMCVSS 6.1PoCv10.0.59.sip.pc20.ct2017-11-16
CVE-2017-16836 [MEDIUM] CWE-79 CVE-2017-16836: Arris TG1682G devices with Comcast TG1682_2.0s7_PRODse 10.0.59.SIP.PC20.CT software allow Unauthenti Arris TG1682G devices with Comcast TG1682_2.0s7_PRODse 10.0.59.SIP.PC20.CT software allow Unauthenticated Stored XSS via the actionHandler/ajax_managed_services.php service parameter.
nvd
CVE-2017-9521CRITICALCVSS 9.8v10.0.132.sip.pc20.ctvtg1682_2.2p7s2_prod_sey2017-07-31
CVE-2017-9521 [CRITICAL] CVE-2017-9521: The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.P
nvd
CVE-2017-9489HIGHCVSS 8.8v10.0.132.sip.pc20.ctvtg1682_2.2p7s2_prod_sey2017-07-31
CVE-2017-9489 [HIGH] CWE-352 CVE-2017-9489: The Comcast firmware on Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST) devices The Comcast firmware on Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST) devices allows configuration changes via CSRF.
nvd
CVE-2017-9492HIGHCVSS 7.5v10.0.132.sip.pc20.ctvtg1682_2.2p7s2_prod_sey2017-07-31
CVE-2017-9492 [HIGH] CWE-200 CVE-2017-9492: The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.S
nvd
CVE-2017-9476MEDIUMCVSS 6.5v10.0.132.sip.pc20.ctvtg1682_2.2p7s2_prod_sey2017-07-31
CVE-2017-9476 [MEDIUM] CWE-200 CVE-2017-9476: The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices makes it easy for remote attackers to determine the hidden SSID
nvd
CVE-2017-9491MEDIUMCVSS 5.3v10.0.132.sip.pc20.ctvtg1682_2.2p7s2_prod_sey2017-07-31
CVE-2017-9491 [MEDIUM] CWE-200 CVE-2017-9491: The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132
nvd