Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More
The SpiderLabs team at Trustwave published a new advisory yesterday, which details three vulnerabilities in the Comcast DOCSIS 3.0 Business Gateways (SMCD3G-CCR). The Comcast DOCSIS 3.0 Business Gateway provides end-user termination of cable internet services for Comcast Business Class customers with enhanced services including Network Address Translation (NAT), firewalling, and Virtual Private Network (VPN) termination.
In total, three vulnerabilities were disclosed. The first is the prevalence of a hard-coded root-level username and password on all SMCD3G-CCR devices. This account provides full access to any device which has not been updated. The second issue is a cross-site request forgery vulnerability on the management interface of all SMCD3G-CCR gateways. Refer to the full advisory for a proof-of-concept which demonstrates how a malicious user can access, log-in, and modify the DNS information on an end-user's network. The third vulnerability disclosed weak session management, which allowed a malicious user to brute force the session key for a logged-in administrative user.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2024 Trustwave Holdings, Inc. All rights reserved.