{"vuid":"VU#855836","idnumber":"855836","name":"Arris Touchstone cable modem information leakage vulnerabiliity","keywords":["arris","touchstone","cwe-200","snmp"],"overview":"Arris Touchstone DG950A cable modem enables SNMP public access by default.","clean_desc":"CWE-200 - Information Exposure\nThe Arris Touchstone DG950A cable modem running software version 7.10.131 was found to expose sensitive information such as passwords, ssids, and wifi keys via the SNMP public community string. Other versions may also be affected by this vulnerability.","impact":"A remote unauthenticated attacker may be able to retrieve passwords, ssids, and other sensitive information about the device.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Deral Heiland of Rapid7, Inc. for reporting this vulnerability.","author":"This document was written by Chris King.","public":["http://moto.arrisi.com/support/documentation/user_guides/_docs/DG950_User_Guide_Std1-4.pdf","http://cwe.mitre.org/data/definitions/200.html","https://community.rapid7.com/community/metasploit/blog/2014/08/21/more-snmp-information-leaks-cve-2014-4862-and-cve-2014-4863"],"cveids":["CVE-2014-4863"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-07-10T16:50:21Z","publicdate":"2014-08-21T00:00:00Z","datefirstpublished":"2014-09-04T14:25:51Z","dateupdated":"2014-09-04T14:25:55Z","revision":12,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"UR","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:N/A:N","cvss_temporalscore":"4.5","cvss_environmentalscore":"3.35625160185","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}