- Description
- CommScope ARRIS TR4400 devices with firmware through A1.00.004-180301 are vulnerable to an authentication bypass to the administrative interface because they include the current base64 encoded password within http://192.168.1.1/login.html. Any user connected to the Wi-Fi can exploit this.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-326
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:commscope:tr4400_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "282791F7-9CD0-4772-AE3F-5801792F8A36",
"versionEndIncluding": "a1.00.004-180301"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:commscope:tr4400:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "34054E19-C957-4B56-88C7-8E0973B33D90"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]