Description
Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-7220 | Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP. |
References
| Link | Providers |
|---|---|
| http://www.kb.cert.org/vuls/id/419568 |
|
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T07:43:46.130Z
Reserved: 2015-09-18T00:00:00.000Z
Link: CVE-2015-7289
No data.
Status : Deferred
Published: 2015-11-21T11:59:16.620
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-7289
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD