Lucene search

K
certCERTVU:123140
HistoryOct 13, 2006 - 12:00 a.m.

Cisco products contain hard-coded SNMP values

2006-10-1300:00:00
www.kb.cert.org
16

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.027

Percentile

90.5%

Overview

Certain versions of the Cisco IOS software have a hard-coded SNMP read-write community string that cannot be changed by an administrator.

Description

Some versions of the Cisco IOS have a hardcoded SNMP read-write community string. This community string is designed to ensure that DOCSIS-compliant cable modems adhere to RFC 2669.

A vulnerability exists in the enabling of these strings in Cisco IOS versions which do not run on cable modems. An attacker may be able to take control of an affected device by using standard SNMP commands.

Cisco states that the following devices are affected by this vulnerability:

* Cisco IAD2430 Integrated Access Device
* Cisco IAD2431 Integrated Access Device
* Cisco IAD2432 Integrated Access Device
* Cisco VG224 Analog Phone Gateway
* Cisco MWR 1900 Mobile Wireless Edge Router
* Cisco MWR 1941 Mobile Wireless Edge Router  

Impact

A remote attacker may be able to take control of an affected device.


Solution

UpdateCisco has released updates that address this issue. Please see Cisco Security Advisory cisco-sa-20060920-docsis for more details.


In addition to the updates indicated above, Cisco has published a number of workarounds for this issue. Users, particularly those who are not able to apply the updates, are encouraged to implement these workarounds.


Vendor Information

123140

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Cisco Systems, Inc. __ Affected

Updated: October 13, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See cisco-sa-20060920-docsis for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23123140 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Cisco for providing information about this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-4950
Severity Metric: 7.27 Date Public:

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.027

Percentile

90.5%