{ "schema_version": "1.4.0", "id": "GHSA-7vw7-45gr-9vpj", "modified": "2022-05-13T01:06:01Z", "published": "2022-05-13T01:06:01Z", "aliases": [ "CVE-2018-10989" ], "details": "Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of \"password\" for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging access to the local network. NOTE: one or more user's guides distributed by ISPs state \"At a minimum, you should set a login password.\"", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10989" }, { "type": "WEB", "url": "https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c" } ], "database_specific": { "cwe_ids": [ "CWE-1188" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-05-14T14:29:00Z" } }