CVE-2019-19494

CVSS V2 High 9.3 CVSS V3 High 8.8
Description
Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11.
Overview
  • CVE ID
  • CVE-2019-19494
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-01-09T13:15:10
  • Last Modified Date
  • 2020-01-28T19:43:00
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:sagemcom:f\@st_3890_firmware:*:*:*:*:*:*:*:* 1 OR 50.10.21_t4
cpe:2.3:h:sagemcom:f\@st_3890:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sagemcom:f\@st_3890_firmware:*:*:*:*:*:*:*:* 1 OR 05.76.6.3f
cpe:2.3:h:sagemcom:f\@st_3890:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:sagemcom:f\@st_3686_firmware:3.428.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:sagemcom:f\@st_3686_firmware:4.83.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:sagemcom:f\@st_3686:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:cg3700emr_firmware:2.01.03:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:netgear:cg3700emr_firmware:2.01.05:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:cg3700emr:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:c6250emr_firmware:2.01.03:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:netgear:c6250emr_firmware:2.01.05:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:c6250emr:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:technicolor:tc7230_steb_firmware:01.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:technicolor:tc7230_steb:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:compal:7284e_firmware:5.510.5.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:compal:7284e:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:compal:7486e_firmware:5.510.5.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:compal:7486e:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://cablehaunt.com Exploit Technical Description Third Party Advisory
https://www.broadcom.com Product
https://github.com/Lyrebirds/Cable-Haunt-Report/releases/download/2.4/report.pdf Technical Description Third Party Advisory
https://github.com/Lyrebirds/Fast8690-exploit Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:52:17 Added to TrackCVE
2022-12-04 09:11:59 2020-01-09T13:15Z 2020-01-09T13:15:10 CVE Published Date updated
2022-12-04 09:11:59 2020-01-28T19:43:00 CVE Modified Date updated
2022-12-04 09:11:59 Analyzed Vulnerability Status updated