The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-5627 The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T19:20:40.538Z

Reserved: 2017-09-03T00:00:00

Link: CVE-2017-14115

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-09-03T19:29:00.267

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-14115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses