CVE-2017-9493
low-risk
Published 2017-07-31
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows remote attackers to conduct successful forced-pairing attacks (between an RF4CE remote and a set-top box) by repeatedly transmitting the same pairing code.
Do I need to act?
-
0.20% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.3/10
Medium
ADJACENT_NETWORK
/ LOW complexity
Affected Products (1)
Mx011Anm Firmware
Affected Vendors
References (2)
Third Party Advisory
https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille...
Third Party Advisory
https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille...
26
/ 100
low-risk
Severity
20/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal