Description
Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-7220 | Arris DG860A, TG862A, and TG862G devices with firmware TS0703128_100611 through TS0705125D_031115 have a hardcoded administrator password derived from a serial number, which makes it easier for remote attackers to obtain access via the web management interface, SSH, TELNET, or SNMP. |
References
| Link | Providers |
|---|---|
| http://www.kb.cert.org/vuls/id/419568 |
|
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T07:43:46.130Z
Reserved: 2015-09-18T00:00:00.000Z
Link: CVE-2015-7289
No data.
Status : Modified
Published: 2015-11-21T11:59:16.620
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-7289
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD