search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco products contain hard-coded SNMP values

Vulnerability Note VU#123140

Original Release Date: 2006-10-13 | Last Revised: 2006-10-13

Overview

Certain versions of the Cisco IOS software have a hard-coded SNMP read-write community string that cannot be changed by an administrator.

Description

Some versions of the Cisco IOS have a hardcoded SNMP read-write community string. This community string is designed to ensure that DOCSIS-compliant cable modems adhere to RFC 2669.

A vulnerability exists in the enabling of these strings in Cisco IOS versions which do not run on cable modems. An attacker may be able to take control of an affected device by using standard SNMP commands.

Cisco states that the following devices are affected by this vulnerability:

    • Cisco IAD2430 Integrated Access Device
    • Cisco IAD2431 Integrated Access Device
    • Cisco IAD2432 Integrated Access Device
    • Cisco VG224 Analog Phone Gateway
    • Cisco MWR 1900 Mobile Wireless Edge Router
    • Cisco MWR 1941 Mobile Wireless Edge Router

Impact

A remote attacker may be able to take control of an affected device.

Solution

UpdateCisco has released updates that address this issue. Please see Cisco Security Advisory cisco-sa-20060920-docsis for more details.


In addition to the updates indicated above, Cisco has published a number of workarounds for this issue. Users, particularly those who are not able to apply the updates, are encouraged to implement these workarounds.

Vendor Information

123140
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Cisco for providing information about this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-4950
Severity Metric: 7.27
Date Public: 2006-09-20
Date First Published: 2006-10-13
Date Last Updated: 2006-10-13 20:24 UTC
Document Revision: 33

Sponsored by CISA.