ARRIS DG950A 7.10.145 and DG950S 7.10.145.EURO devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
References
Link | Resource |
---|---|
https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv | Third Party Advisory |
https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html | Exploit Third Party Advisory |
https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv | Third Party Advisory |
https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv - Third Party Advisory | |
References | () https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html - Exploit, Third Party Advisory |
Information
Published : 2018-12-23 21:29
Updated : 2024-11-21 04:01
NVD link : CVE-2018-20383
Mitre link : CVE-2018-20383
CVE.ORG link : CVE-2018-20383
JSON object : View
Products Affected
commscope
- arris_dg950s
- arris_dg950a_firmware
- arris_dg950a
arris
- dg950s_firmware
CWE
CWE-522
Insufficiently Protected Credentials