Vulnerability Name: | CVE-2002-1706 (CCN-9368) | ||||||||
Assigned: | 2002-06-17 | ||||||||
Published: | 2002-06-17 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) settings via a DOCSIS file without a Message Integrity Check (MIC) signature, which is approved by the router. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2002-1706 Source: CCN Type: Cisco Systems Inc. Security Advisory, 2002 June 17 at 19:00 GMT Cable Modem Termination System Authentication Bypass Source: CISCO Type: Patch, Vendor Advisory 20020617 Cable Modem Termination System Authentication Bypass Source: CCN Type: OSVDB ID: 21561 Cisco IOS DOCSIS Settings Crafted File Remote Modification Source: BID Type: Patch 5041 Source: CCN Type: BID-5041 Cisco uBR7200 / uBR7100 Universal Broadband Routers DOCSIS MIC Bypass Vulnerability Source: XF Type: UNKNOWN cisco-ubr-mic-bypass(9368) Source: XF Type: UNKNOWN cisco-ubr-mic-bypass(9368) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |