ID

VAR-200212-0581


CVE

CVE-2002-1706


TITLE

Cable Modem Termination System  Vulnerability where configuration files with invalid parameters are applied in

Trust: 0.8

sources: JVNDB: JVNDB-2002-000133

DESCRIPTION

Cisco IOS software 11.3 through 12.2 running on Cisco uBR7200 and uBR7100 series Universal Broadband Routers allows remote attackers to modify Data Over Cable Service Interface Specification (DOCSIS) settings via a DOCSIS file without a Message Integrity Check (MIC) signature, which is approved by the router. CMTS is running on Cisco IOS Due to deficiencies in Cisco uBR7100 and uBR7200 contains a vulnerability in which a configuration file with invalid parameters is applied.Cisco uBR7100 and uBR7200 may apply a configuration file with invalid parameters. A vulnerability has been announced which affects Cisco uBR7200 series and uBR7100 series Universal Broadband Routers under some versions of IOS. Invalid DOCSIS files without an MIC signature may be accepted by a vulnerable router, even if MIC signatures are required. Exploitation of this vulnerability may allow arbitrary configuration files to be accepted by the network. Even if the router configuration requires MIC signatures to receive files, it may incorrectly receive illegal DOCSIS configuration files, which may lead attackers to exploit This vulnerability reconfigures the router, removes related bandwidth restrictions and other illegal operations

Trust: 1.98

sources: NVD: CVE-2002-1706 // JVNDB: JVNDB-2002-000133 // BID: 5041 // VULHUB: VHN-6089

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:lteversion:12.2

Trust: 1.0

vendor:ciscomodel:iosscope:gteversion:11.3

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.9

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.9

vendor:シスコシステムズmodel:cisco iosscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco iosscope:eqversion:12.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco iosscope:eqversion:11.3

Trust: 0.8

vendor:シスコシステムズmodel:cisco iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.1cx

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.1ec

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:11.3t

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2bc

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2xf

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:11.3xa

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.1t

Trust: 0.6

vendor:ciscomodel:ios 12.2xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1cxscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.3

vendor:ciscomodel:ios 12.0xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0scscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3nascope: - version: -

Trust: 0.3

sources: BID: 5041 // JVNDB: JVNDB-2002-000133 // CNNVD: CNNVD-200212-158 // NVD: CVE-2002-1706

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-1706
value: HIGH

Trust: 1.0

NVD: CVE-2002-1706
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200212-158
value: MEDIUM

Trust: 0.6

VULHUB: VHN-6089
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-1706
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-6089
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2002-1706
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2002-1706
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-6089 // JVNDB: JVNDB-2002-000133 // CNNVD: CNNVD-200212-158 // NVD: CVE-2002-1706

PROBLEMTYPE DATA

problemtype:CWE-347

Trust: 1.0

problemtype:Improper verification of digital signatures (CWE-347) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2002-000133 // NVD: CVE-2002-1706

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200212-158

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200212-158

PATCH

title:cmts-MD5-bypass-puburl:http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2002-000133

EXTERNAL IDS

db:NVDid:CVE-2002-1706

Trust: 3.3

db:BIDid:5041

Trust: 2.8

db:JVNDBid:JVNDB-2002-000133

Trust: 0.8

db:CNNVDid:CNNVD-200212-158

Trust: 0.7

db:NSFOCUSid:3008

Trust: 0.6

db:XFid:9368

Trust: 0.6

db:CISCOid:20020617 CABLE MODEM TERMINATION SYSTEM AUTHENTICATION BYPASS

Trust: 0.6

db:VULHUBid:VHN-6089

Trust: 0.1

sources: VULHUB: VHN-6089 // BID: 5041 // JVNDB: JVNDB-2002-000133 // CNNVD: CNNVD-200212-158 // NVD: CVE-2002-1706

REFERENCES

url:http://www.securityfocus.com/bid/5041

Trust: 2.5

url:http://www.cisco.com/warp/public/707/cmts-md5-bypass-pub.shtml

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/9368

Trust: 1.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1706

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/9368

Trust: 0.6

url:http://www.nsfocus.net/vulndb/3008

Trust: 0.6

sources: VULHUB: VHN-6089 // JVNDB: JVNDB-2002-000133 // CNNVD: CNNVD-200212-158 // NVD: CVE-2002-1706

CREDITS

Cisco Systems Product Security Incident Response Team※ psirt@cisco.com

Trust: 0.6

sources: CNNVD: CNNVD-200212-158

SOURCES

db:VULHUBid:VHN-6089
db:BIDid:5041
db:JVNDBid:JVNDB-2002-000133
db:CNNVDid:CNNVD-200212-158
db:NVDid:CVE-2002-1706

LAST UPDATE DATE

2024-08-14T15:36:09.520000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-6089date:2017-07-11T00:00:00
db:BIDid:5041date:2002-06-17T00:00:00
db:JVNDBid:JVNDB-2002-000133date:2024-02-29T02:11:00
db:CNNVDid:CNNVD-200212-158date:2005-10-20T00:00:00
db:NVDid:CVE-2002-1706date:2024-02-08T20:47:29.867

SOURCES RELEASE DATE

db:VULHUBid:VHN-6089date:2002-12-31T00:00:00
db:BIDid:5041date:2002-06-17T00:00:00
db:JVNDBid:JVNDB-2002-000133date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200212-158date:2002-06-17T00:00:00
db:NVDid:CVE-2002-1706date:2002-12-31T05:00:00