445
VMScore

CVE-2017-9491

Published: 31/07/2017 Updated: 13/09/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not set the secure flag for cookies in an https session to an administration application, which makes it easier for remote malicious users to capture these cookies by intercepting their transmission within an http session.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco dpc3939_firmware dpc3939-p20-18-v303r20421733-160420a-cmcst

cisco dpc3939_firmware dpc3939-p20-18-v303r20421746-170221a-cmcst

cisco dpc3939b_firmware dpc3939b-v303r204217-150321a-cmcst

cisco dpc3941t_firmware dpc3941_2.5s3_prod_sey

commscope arris_tg1682g_firmware 10.0.132.sip.pc20.ct

commscope arris_tg1682g_firmware tg1682_2.2p7s2_prod_sey