commscope CVE Vulnerabilities & Metrics

Focus on commscope vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About commscope Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with commscope. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total commscope CVEs: 42
Earliest CVE date: 19 Jun 2014, 14:55 UTC
Latest CVE date: 26 Jan 2024, 00:15 UTC

Latest CVE reference: CVE-2024-23618

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical commscope CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.43

Max CVSS: 10.0

Critical CVEs (≥9): 12

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 17
7.0-8.9 8
9.0-10.0 12

CVSS Distribution Chart

Top 5 Highest CVSS commscope CVEs

These are the five CVEs with the highest CVSS scores for commscope, sorted by severity first and recency.

All CVEs for commscope

CVE-2024-23618 commscope vulnerability CVSS: 8.3 26 Jan 2024, 00:15 UTC

An arbitrary code execution vulnerability exists in Arris SURFboard SGB6950AC2 devices. An unauthenticated attacker can exploit this vulnerability to achieve code execution as root.

CVE-2023-45992 commscope vulnerability CVSS: 0 19 Oct 2023, 19:15 UTC

A vulnerability in the web-based interface of the RUCKUS Cloudpath product on version 5.12 build 5538 or before to could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against a user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system.

CVE-2023-27572 commscope vulnerability CVSS: 0 15 Apr 2023, 00:15 UTC

An issue was discovered in CommScope Arris DG3450 Cable Gateway AR01.02.056.18_041520_711.NCS.10. A reflected XSS vulnerability was discovered in the https_redirect.php web page via the page parameter.

CVE-2023-27571 commscope vulnerability CVSS: 0 15 Apr 2023, 00:15 UTC

An issue was discovered in DG3450 Cable Gateway AR01.02.056.18_041520_711.NCS.10. The troubleshooting_logs_download.php log file download functionality does not check the session cookie. Thus, an attacker can download all log files.

CVE-2022-45701 commscope vulnerability CVSS: 0 17 Feb 2023, 15:15 UTC

Arris TG2482A firmware through 9.1.103GEM9 allow Remote Code Execution (RCE) via the ping utility feature.

CVE-2022-27002 commscope vulnerability CVSS: 10.0 15 Mar 2022, 22:15 UTC

Arris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the ddns function via the ddns_name, ddns_pwd, h_ddns、ddns_host parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVE-2022-27001 commscope vulnerability CVSS: 10.0 15 Mar 2022, 22:15 UTC

Arris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the dhcp function via the hostname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVE-2022-27000 commscope vulnerability CVSS: 10.0 15 Mar 2022, 22:15 UTC

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the time and time zone function via the h_primary_ntp_server, h_backup_ntp_server, and h_time_zone parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVE-2022-26999 commscope vulnerability CVSS: 10.0 15 Mar 2022, 22:15 UTC

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the static ip settings function via the wan_ip_stat, wan_mask_stat, wan_gw_stat, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVE-2022-26998 commscope vulnerability CVSS: 10.0 15 Mar 2022, 22:15 UTC

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the wps setting function via the wps_enrolee_pin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVE-2022-26997 commscope vulnerability CVSS: 10.0 15 Mar 2022, 22:15 UTC

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the upnp function via the upnp_ttl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVE-2022-26996 commscope vulnerability CVSS: 10.0 15 Mar 2022, 22:15 UTC

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pppoe function via the pppoe_username, pppoe_passwd, and pppoe_servicename parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVE-2022-26995 commscope vulnerability CVSS: 10.0 15 Mar 2022, 22:15 UTC

Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pptp (wan_pptp.html) function via the pptp_fix_ip, pptp_fix_mask, pptp_fix_gw, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVE-2021-41552 commscope vulnerability CVSS: 5.8 15 Feb 2022, 14:15 UTC

CommScope SURFboard SBG6950AC2 9.1.103AA23 devices allow Command Injection.

CVE-2021-20119 commscope vulnerability CVSS: 4.9 09 Nov 2021, 19:15 UTC

The password change utility for the Arris SurfBoard SB8200 can have safety measures bypassed that allow any logged-in user to change the administrator password.

CVE-2021-20120 commscope vulnerability CVSS: 6.8 21 Oct 2021, 17:15 UTC

The administration web interface for the Arris Surfboard SB8200 lacks any protections against cross-site request forgery attacks. This means that an attacker could make configuration changes (such as changing the administrative password) without the consent of the user.

CVE-2021-33221 commscope vulnerability CVSS: 7.5 07 Jul 2021, 15:15 UTC

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Unauthenticated API Endpoints.

CVE-2021-33220 commscope vulnerability CVSS: 4.6 07 Jul 2021, 15:15 UTC

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. Hard-coded API Keys exist.

CVE-2021-33219 commscope vulnerability CVSS: 7.5 07 Jul 2021, 15:15 UTC

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded Web Application Administrator Passwords for the admin and nplus1user accounts.

CVE-2021-33218 commscope vulnerability CVSS: 10.0 07 Jul 2021, 15:15 UTC

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded System Passwords that provide shell access.

CVE-2021-33217 commscope vulnerability CVSS: 9.0 07 Jul 2021, 15:15 UTC

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The Web Application allows Arbitrary Read/Write actions by authenticated users. The API allows an HTTP POST of arbitrary content into any file on the filesystem as root.

CVE-2021-33216 commscope vulnerability CVSS: 7.5 07 Jul 2021, 15:15 UTC

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. An Undocumented Backdoor exists, allowing shell access via a developer account.

CVE-2021-33215 commscope vulnerability CVSS: 4.0 07 Jul 2021, 15:15 UTC

An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The API allows Directory Traversal.

CVE-2020-26879 commscope vulnerability CVSS: 10.0 26 Oct 2020, 20:15 UTC

Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.

CVE-2020-26878 commscope vulnerability CVSS: 9.0 26 Oct 2020, 20:15 UTC

Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.

CVE-2020-8830 commscope vulnerability CVSS: 6.8 05 May 2020, 18:15 UTC

CSRF in login.asp on Ruckus devices allows an attacker to access the panel, and use SSRF to perform scraping or other analysis via the SUBCA-1 field on the Wireless Admin screen.

CVE-2020-8033 commscope vulnerability CVSS: 4.3 05 May 2020, 18:15 UTC

Ruckus R500 3.4.2.0.384 devices allow XSS via the index.asp Device Name field.

CVE-2020-7983 commscope vulnerability CVSS: 5.8 05 May 2020, 18:15 UTC

A CSRF issue in login.asp on Ruckus R500 3.4.2.0.384 devices allows remote attackers to access the panel or conduct SSRF attacks.

CVE-2020-9476 commscope vulnerability CVSS: 5.0 04 Mar 2020, 19:15 UTC

ARRIS TG1692A devices allow remote attackers to discover the administrator login name and password by reading the /login page and performing base64 decoding.

CVE-2019-15806 commscope vulnerability CVSS: 7.5 29 Aug 2019, 18:15 UTC

CommScope ARRIS TR4400 devices with firmware through A1.00.004-180301 are vulnerable to an authentication bypass to the administrative interface because they include the current base64 encoded password within http://192.168.1.1/basic_sett.html. Any user connected to the Wi-Fi can exploit this.

CVE-2019-15805 commscope vulnerability CVSS: 7.5 29 Aug 2019, 18:15 UTC

CommScope ARRIS TR4400 devices with firmware through A1.00.004-180301 are vulnerable to an authentication bypass to the administrative interface because they include the current base64 encoded password within http://192.168.1.1/login.html. Any user connected to the Wi-Fi can exploit this.

CVE-2018-20386 commscope vulnerability CVSS: 5.0 23 Dec 2018, 21:29 UTC

ARRIS SBG6580-2 D30GW-SEAEAGLE-1.5.2.5-GA-00-NOSH devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.

CVE-2018-20383 commscope vulnerability CVSS: 5.0 23 Dec 2018, 21:29 UTC

ARRIS DG950A 7.10.145 and DG950S 7.10.145.EURO devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.

CVE-2018-17555 commscope vulnerability CVSS: 5.0 26 Sep 2018, 20:29 UTC

The web component on ARRIS TG2492LG-NA 061213 devices allows remote attackers to obtain sensitive information via the /snmpGet oids parameter.

CVE-2018-10990 commscope vulnerability CVSS: 7.5 14 May 2018, 14:29 UTC

On Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices, a logout action does not immediately destroy all state on the device related to the validity of the "credential" cookie, which might make it easier for attackers to obtain access at a later time (e.g., "at least for a few minutes"). NOTE: there is no documentation stating that the web UI's logout feature was supposed to do anything beyond removing the cookie from one instance of a web browser; a client-side logout action is often not intended to address cases where a person has made a copy of a cookie outside of a browser.

CVE-2018-10989 commscope vulnerability CVSS: 3.5 14 May 2018, 14:29 UTC

Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of "password" for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging access to the local network. NOTE: one or more user's guides distributed by ISPs state "At a minimum, you should set a login password."

CVE-2017-16836 commscope vulnerability CVSS: 4.3 16 Nov 2017, 02:29 UTC

Arris TG1682G devices with Comcast TG1682_2.0s7_PRODse 10.0.59.SIP.PC20.CT software allow Unauthenticated Stored XSS via the actionHandler/ajax_managed_services.php service parameter.

CVE-2017-9521 commscope vulnerability CVSS: 7.5 31 Jul 2017, 03:29 UTC

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices allows remote attackers to execute arbitrary code via a specific (but unstated) exposed service. NOTE: the scope of this CVE does NOT include the concept of "Unnecessary Services" in general; the scope is only a single service that is unnecessarily exposed, leading to remote code execution. The details of that service might be disclosed at a later date.

CVE-2017-9492 commscope vulnerability CVSS: 5.0 31 Jul 2017, 03:29 UTC

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not include the HTTPOnly flag in a Set-Cookie header for administration applications, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies.

CVE-2017-9491 commscope vulnerability CVSS: 5.0 31 Jul 2017, 03:29 UTC

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST); Cisco DPC3941T (firmware version DPC3941_2.5s3_PROD_sey); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices does not set the secure flag for cookies in an https session to an administration application, which makes it easier for remote attackers to capture these cookies by intercepting their transmission within an http session.

CVE-2017-9489 commscope vulnerability CVSS: 6.8 31 Jul 2017, 03:29 UTC

The Comcast firmware on Cisco DPC3939B (firmware version dpc3939b-v303r204217-150321a-CMCST) devices allows configuration changes via CSRF.

CVE-2017-9476 commscope vulnerability CVSS: 3.3 31 Jul 2017, 03:29 UTC

The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices makes it easy for remote attackers to determine the hidden SSID and passphrase for a Home Security Wi-Fi network.

CVE-2014-3778 commscope vulnerability CVSS: 6.8 19 Jun 2014, 14:55 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in goform/RgDdns in ARRIS (formerly Motorola) SBG901 SURFboard Wireless Cable Modem allow remote attackers to hijack the authentication of administrators for requests that (1) change the dns service via the DdnsService parameter, (2) change the username via the DdnsUserName parameter, (3) change the password via the DdnsPassword parameter, or (4) change the host name via the DdnsHostName parameter.