{"vuid":"VU#123140","idnumber":"123140","name":"Cisco products contain hard-coded SNMP values","keywords":["Cisco","privilege escalation","Data Over Cable Service Interface Specification","DOCSIS"],"overview":"Certain versions of the Cisco IOS software have a hard-coded SNMP read-write community string that cannot be changed by an administrator.","clean_desc":"Some versions of the Cisco IOS have a hardcoded SNMP read-write community string. This community string is designed to ensure that DOCSIS-compliant cable modems adhere to RFC 2669. A vulnerability exists in the enabling of these strings in Cisco IOS versions which do not run on cable modems. An attacker may be able to take control of an affected device by using standard SNMP commands. Cisco states that the following devices are affected by this vulnerability: Cisco IAD2430 Integrated Access Device\nCisco IAD2431 Integrated Access Device\nCisco IAD2432 Integrated Access Device\nCisco VG224 Analog Phone Gateway\nCisco MWR 1900 Mobile Wireless Edge Router\nCisco MWR 1941 Mobile Wireless Edge Router","impact":"A remote attacker may be able to take control of an affected device.","resolution":"Update\nCisco has released updates that address this issue. Please see Cisco Security Advisory cisco-sa-20060920-docsis for more details.","workarounds":"In addition to the updates indicated above, Cisco has published a number of workarounds for this issue. Users, particularly those who are not able to apply the updates, are encouraged to implement these workarounds.","sysaffected":"","thanks":"Thanks to Cisco for providing information about this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://www.cisco.com/warp/public/707/cisco-sa-20060920-docsis.shtml","http://secunia.com/advisories/21974/"],"cveids":["CVE-2006-4950"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-09-20T21:02:17Z","publicdate":"2006-09-20T00:00:00Z","datefirstpublished":"2006-10-13T20:17:13Z","dateupdated":"2006-10-13T20:24:29Z","revision":33,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"16","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"4","cam_impact":"20","cam_easeofexploitation":"17","cam_attackeraccessrequired":"15","cam_scorecurrent":"7.2675","cam_scorecurrentwidelyknown":"8.7975","cam_scorecurrentwidelyknownexploited":"16.4475","ipprotocol":"udp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.2675,"vulnote":null}