sagemcom CVE Vulnerabilities & Metrics

Focus on sagemcom vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About sagemcom Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with sagemcom. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total sagemcom CVEs: 8
Earliest CVE date: 09 Mar 2017, 09:59 UTC
Latest CVE date: 14 Mar 2024, 13:15 UTC

Latest CVE reference: CVE-2024-1623

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical sagemcom CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.99

Max CVSS: 9.3

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 3
7.0-8.9 2
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS sagemcom CVEs

These are the five CVEs with the highest CVSS scores for sagemcom, sorted by severity first and recency.

All CVEs for sagemcom

CVE-2024-1623 sagemcom vulnerability CVSS: 0 14 Mar 2024, 13:15 UTC

Insufficient session timeout vulnerability in the FAST3686 V2 Vodafone router from Sagemcom. This vulnerability could allow a local attacker to access the administration panel without requiring login credentials. This vulnerability is possible because the 'Login.asp and logout.asp' files do not handle session details correctly.

CVE-2021-3304 sagemcom vulnerability CVSS: 7.5 26 Jan 2021, 18:16 UTC

Sagemcom F@ST 3686 v2 3.495 devices have a buffer overflow via a long sessionKey to the goform/login URI.

CVE-2020-29138 sagemcom vulnerability CVSS: 5.0 27 Nov 2020, 16:15 UTC

Incorrect Access Control in the configuration backup path in SAGEMCOM F@ST3486 NET DOCSIS 3.0, software NET_4.109.0, allows remote unauthenticated users to download the router configuration file via the /backupsettings.conf URI, when any valid session is running.

CVE-2020-21733 sagemcom vulnerability CVSS: 4.3 14 Sep 2020, 12:15 UTC

Sagemcom F@ST3686 v1.0 HUN 3.97.0 has XSS via RgDiagnostics.asp, RgDdns.asp, RgFirewallEL.asp, RgVpnL2tpPptp.asp.

CVE-2020-24034 sagemcom vulnerability CVSS: 9.0 01 Sep 2020, 18:15 UTC

Sagemcom F@ST 5280 routers using firmware version 1.150.61 have insecure deserialization that allows any authenticated user to perform a privilege escalation to any other user. By making a request with valid sess_id, nonce, and ha1 values inside of the serialized session cookie, an attacker may alter the user value inside of this cookie, and assume the role and permissions of the user specified. By assuming the role of the user internal, which is inaccessible to end users by default, the attacker gains the permissions of the internal account, which includes the ability to flash custom firmware to the router, allowing the attacker to achieve a complete compromise.

CVE-2019-19494 sagemcom vulnerability CVSS: 9.3 09 Jan 2020, 13:15 UTC

Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11.

CVE-2019-9555 sagemcom vulnerability CVSS: 5.0 05 Mar 2019, 23:29 UTC

Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.

CVE-2017-6552 sagemcom vulnerability CVSS: 7.8 09 Mar 2017, 09:59 UTC

Livebox 3 Sagemcom SG30_sip-fr-5.15.8.1 devices have an insufficiently large default value for the maximum IPv6 routing table size: it can be filled within minutes. An attacker can exploit this issue to render the affected system unresponsive, resulting in a denial-of-service condition for telephone, Internet, and TV services.