CVE-2017-9495
low-risk
Published 2017-07-31
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows physically proximate attackers to read arbitrary files by pressing "EXIT, Down, Down, 2" on an RF4CE remote to reach the diagnostic display, and then launching a Remote Web Inspector script.
Do I need to act?
-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.6/10
Medium
PHYSICAL
/ LOW complexity
Affected Products (1)
Mx011Anm Firmware
Affected Vendors
References (2)
Third Party Advisory
https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille...
Third Party Advisory
https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille...
21
/ 100
low-risk
Severity
16/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal