The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures an unauthenticated proxy service on WAN TCP port 49152, which allows remote attackers to establish arbitrary TCP connections to intranet hosts by sending \x2a\xce\x01 followed by other predictable values.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100585 | Third Party Advisory VDB Entry |
https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753/ | Third Party Advisory |
https://www.nomotion.net/blog/sharknatto/ | Exploit Mitigation Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-09-03T19:00:00
Updated: 2017-09-05T09:57:01
Reserved: 2017-09-03T00:00:00
Link: CVE-2017-14117
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-09-03T19:29:00.330
Modified: 2017-09-13T13:24:32.323
Link: CVE-2017-14117
JSON object: View
Redhat Information
No data.
CWE