7.5
CVSSv2

CVE-2015-6401

Published: 14/12/2015 Updated: 13/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cisco EPC3928 devices with EDVA 5.5.10, 5.5.11, and 5.7.1 allow remote malicious users to bypass an intended authentication requirement and execute unspecified administrative functions via a crafted HTTP request, aka Bug ID CSCux24941.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco epc3928 docsis 3.0 8x4 wireless residential gateway with embedded digital voice adapter 5.5.10

cisco epc3928 docsis 3.0 8x4 wireless residential gateway with embedded digital voice adapter 5.5.11

cisco epc3928 docsis 3.0 8x4 wireless residential gateway with embedded digital voice adapter 5.7.1

Vendor Advisories

A vulnerability with web interface access authentication of the Cisco EPC3928 Wireless Residential Gateway could allow an unauthenticated, remote attacker to issue a subset of commands as the administrator without authenticating to the device The vulnerability is due to lack of authentication required for certain administrative functions through ...

Exploits

# Title: Cisco EPC 3928 Multiple Vulnerabilities # Vendor: wwwciscocom/ # Vulnerable Version(s): Cisco Model EPC3928 DOCSIS 30 8x4 Wireless Residential Gateway # CVE References: CVE-2015-6401 / CVE-2015-6402 / CVE-2016-1328 / CVE-2016-1336 / CVE-2016-1337 # Author: Patryk Bogdan from Secorda security team (secordacom/) ======== ...
Cisco EPC 3928 suffers from cross site scripting, command execution, denial of service, and other vulnerabilities ...