Lucene search

K
AttU-verse Firmware9.2.2h0d83

4 matches found

CVE
CVE
added 2017/09/03 7:29 p.m.56 views

CVE-2017-14115

The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subseq...

9.3CVSS8.1AI score0.04024EPSS
CVE
CVE
added 2017/09/03 7:29 p.m.49 views

CVE-2017-10793

The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589, NVG599, and unspecified other devices, when IP Passthrough mode is not used, configures an sbdc.ha WAN TCP service on port 61001 with the bdctest account and the bdctest password, which allows remote attackers to obtain sensitive informatio...

8.1CVSS7.8AI score0.01386EPSS
CVE
CVE
added 2017/09/03 7:29 p.m.48 views

CVE-2017-14117

The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures an unauthenticated proxy service on WAN TCP port 49152, which allows remote attackers to establish arbitrary TCP connections to intranet hosts by sending \x2a\xce\x01 follo...

5.9CVSS6.6AI score0.31907EPSS
CVE
CVE
added 2017/09/03 7:29 p.m.42 views

CVE-2017-14116

The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG599 device, when IP Passthrough mode is not used, configures WAN access to a caserver https service with the tech account and an empty password, which allows remote attackers to obtain root privileges by establishing a session on port 49955 and ...

9.3CVSS8AI score0.04024EPSS