CVE-2011-0887

SMC Networks Smcd3g-ccr - Cryptographic Issue

Title source: rule
STIX 2.1

Description

The web management portal on the SMC SMCD3G-CCR (aka Comcast Business Gateway) with firmware before 1.4.0.49.2 uses predictable session IDs based on time values, which makes it easier for remote attackers to hijack sessions via a brute-force attack on the userid cookie.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Trustwave's SpiderLabs · textremotehardware
https://www.exploit-db.com/exploits/16123

References (8)

Core 8
Core References
Exploit mailing-list x_refsource_bugtraq
http://seclists.org/bugtraq/2011/Feb/36
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/65186
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/43199
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/8068
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/46215
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/16123/
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/516205/100/0/threaded

Scores

EPSS 0.1023
EPSS Percentile 93.2%

Details

CWE
CWE-310
Status published
Products (2)
smc_networks/smcd3g-ccr
smc_networks/smcd3g-ccr_firmware 1.4.0.42
Published Feb 08, 2011
Tracked Since Feb 18, 2026