Vulnerability Description
Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) settings via a DOCSIS file without a Message Integrity Check (MIC) signature, which is approved by the router.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios | >= 11.3, <= 12.2 |
| Cisco | Ubr7100 | - |
| Cisco | Ubr7200 | - |
Related Weaknesses (CWE)
References
- http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtmlNot ApplicablePatchVendor Advisory
- http://www.securityfocus.com/bid/5041Broken LinkPatchThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/9368Third Party AdvisoryVDB Entry
- http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtmlNot ApplicablePatchVendor Advisory
- http://www.securityfocus.com/bid/5041Broken LinkPatchThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/9368Third Party AdvisoryVDB Entry
FAQ
What is CVE-2002-1706?
CVE-2002-1706 is a vulnerability with a CVSS score of 7.5 (HIGH). Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) ...
How severe is CVE-2002-1706?
CVE-2002-1706 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1706?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios, Cisco Ubr7100, Cisco Ubr7200.