First published: Tue Dec 31 2002(Updated: )
Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) settings via a DOCSIS file without a Message Integrity Check (MIC) signature, which is approved by the router.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =11.3xa | |
Cisco IOS | =12.0xr | |
Cisco IOS | =11.3na | |
Cisco IOS | =12.1t | |
Cisco IOS | =12.2t | |
Cisco IOS | =12.0t | |
Cisco IOS | =12.1 | |
Cisco IOS | =12.1ec | |
Cisco IOS | =12.1cx | |
Cisco IOS | =12.0sc | |
Cisco IOS | =12.2bc | |
Cisco IOS | =11.3t | |
Cisco IOS | =12.2xf | |
Cisco IOS | =12.2 | |
Cisco IOS | =12.0 | |
All of | ||
Cisco IOS | >=11.3<=12.2 | |
Any of | ||
Cisco Ubr7100 | ||
Cisco uBR7200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.