VAR-201405-0557
Vulnerability from variot - Updated: 2022-05-17 02:09ARRIS SURFboard SBG6580 Series Wi-Fi Cable Modem is a Wi-Fi cable modem. ARRIS SURFboard SBG6580 Series Wi-Fi Cable Modem has an information disclosure vulnerability that allows an attacker to exploit a vulnerability to obtain user interface authentication credentials and wireless network key values through a simple SNMP request. Arris SURFboard SBG6580 is a wireless gateway product from the American Arris Group. An information disclosure vulnerability exists in ARRIS SURFboard SBG6580. An attacker could use this vulnerability to obtain sensitive information. Vulnerabilities in ARRIS SURFboard 6.5.0.0-GA-00-226-NOSH version, other versions may also be affected. This may result in further attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201405-0557",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "surfboard sbg6580 series wi-fi cable modem 6.5.0.0-ga-00-226-nosh",
"scope": null,
"trust": 0.6,
"vendor": "arris",
"version": null
},
{
"model": "group sbg6580 6.5.0.0-ga-00-226-no",
"scope": null,
"trust": 0.3,
"vendor": "arris",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
},
{
"db": "BID",
"id": "67466"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Matthew Kienow",
"sources": [
{
"db": "BID",
"id": "67466"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-331"
}
],
"trust": 0.9
},
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-03175",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "CNVD",
"id": "CNVD-2014-03175",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ARRIS SURFboard SBG6580 Series Wi-Fi Cable Modem is a Wi-Fi cable modem. ARRIS SURFboard SBG6580 Series Wi-Fi Cable Modem has an information disclosure vulnerability that allows an attacker to exploit a vulnerability to obtain user interface authentication credentials and wireless network key values through a simple SNMP request. Arris SURFboard SBG6580 is a wireless gateway product from the American Arris Group. \nAn information disclosure vulnerability exists in ARRIS SURFboard SBG6580. An attacker could use this vulnerability to obtain sensitive information. Vulnerabilities in ARRIS SURFboard 6.5.0.0-GA-00-226-NOSH version, other versions may also be affected. This may result in further attacks",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-331"
},
{
"db": "BID",
"id": "67466"
}
],
"trust": 1.35
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "67466",
"trust": 1.5
},
{
"db": "SECUNIA",
"id": "58569",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2014-03175",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201405-331",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
},
{
"db": "BID",
"id": "67466"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-331"
}
]
},
"id": "VAR-201405-0557",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
}
]
},
"last_update_date": "2022-05-17T02:09:04.824000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.6,
"url": "http://secunia.com/advisories/58569/"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/67466"
},
{
"trust": 0.3,
"url": "http://moto.arrisi.com/products/product.asp?id=928"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
},
{
"db": "BID",
"id": "67466"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-331"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
},
{
"db": "BID",
"id": "67466"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-331"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-05-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03175"
},
{
"date": "2014-05-17T00:00:00",
"db": "BID",
"id": "67466"
},
{
"date": "2014-05-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-331"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-05-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03175"
},
{
"date": "2014-05-17T00:00:00",
"db": "BID",
"id": "67466"
},
{
"date": "2014-05-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-331"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-331"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ARRIS SURFboard SBG6580 Series Wi-Fi Cale Modem Gateway Information Disclosure Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03175"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-331"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…