First published: Tue Dec 31 2002(Updated: )
Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) settings via a DOCSIS file without a Message Integrity Check (MIC) signature, which is approved by the router.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =11.3xa | |
Cisco IOS | =12.0xr | |
Cisco IOS | =11.3na | |
Cisco IOS | =12.1t | |
Cisco IOS | =12.2t | |
Cisco IOS | =12.0t | |
Cisco IOS | =12.1 | |
Cisco IOS | =12.1ec | |
Cisco IOS | =12.1cx | |
Cisco IOS | =12.0sc | |
Cisco IOS | =12.2bc | |
Cisco IOS | =11.3t | |
Cisco IOS | =12.2xf | |
Cisco IOS | =12.2 | |
Cisco IOS | =12.0 | |
All of | ||
Cisco IOS | >=11.3<=12.2 | |
Any of | ||
Cisco Ubr7100 | ||
Cisco uBR7200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2002-1706 is classified as high due to the potential for remote attacks to modify critical DOCSIS settings.
To fix CVE-2002-1706, update the Cisco IOS software to a version that addresses the vulnerability and eliminates the lack of Message Integrity Check.
CVE-2002-1706 affects Cisco IOS versions 11.3 through 12.2, including several specific variants such as 11.3xa and 12.2t.
CVE-2002-1706 impacts Cisco uBR7200 and uBR7100 series Universal Broadband Routers.
Yes, CVE-2002-1706 can be exploited remotely by attackers without any authentication, allowing unauthorized modification of DOCSIS settings.