| |
Vulnerability CVE-2018-10990
Published: 2018-05-14
Description: |
On Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices, a logout action does not immediately destroy all state on the device related to the validity of the "credential" cookie, which might make it easier for attackers to obtain access at a later time (e.g., "at least for a few minutes"). NOTE: there is no documentation stating that the web UI's logout feature was supposed to do anything beyond removing the cookie from one instance of a web browser; a client-side logout action is often not intended to address cases where a person has made a copy of a cookie outside of a browser. |
Type:
CWE-613 (Insufficient Session Expiration)
CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
7.5/10 |
8.5/10 |
6.8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
Complete |
References: |
https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|