### [CVE-2017-9476](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9476) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST); Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST); and Arris TG1682G (eMTA&DOCSIS version 10.0.132.SIP.PC20.CT, software version TG1682_2.2p7s2_PROD_sey) devices makes it easy for remote attackers to determine the hidden SSID and passphrase for a Home Security Wi-Fi network. ### POC #### Reference - https://github.com/BastilleResearch/CableTap/blob/master/doc/advisories/bastille-18.home-security-wifi-network.txt #### Github - https://github.com/madhankumar9182/wireless-network-security - https://github.com/nameisnithin/nithin - https://github.com/soxrok2212/PSKracker - https://github.com/wiire-a/CVE-2017-9476 - https://github.com/yadau/wireless-network-security-assessment