445
VMScore

CVE-2017-9492

Published: 31/07/2017 Updated: 13/09/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to cookies.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco dpc3939_firmware dpc3939-p20-18-v303r20421733-160420a-cmcst

cisco dpc3939_firmware dpc3939-p20-18-v303r20421746-170221a-cmcst

cisco dpc3939b_firmware dpc3939b-v303r204217-150321a-cmcst

cisco dpc3941t_firmware dpc3941_2.5s3_prod_sey

commscope arris_tg1682g_firmware 10.0.132.sip.pc20.ct

commscope arris_tg1682g_firmware tg1682_2.2p7s2_prod_sey