Cisco IOS 12.2 through 12.4 before 20060920, as used by Cisco IAD2430, IAD2431, and IAD2432 Integrated Access Devices, the VG224 Analog Phone Gateway, and the MWR 1900 and 1941 Mobile Wireless Edge Routers, is incorrectly identified as supporting DOCSIS, which allows remote attackers to gain read-write access via a hard-coded cable-docsis community string and read or modify arbitrary SNMP variables.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21974 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1016899 - | |
References | () http://www.cisco.com/warp/public/707/cisco-sa-20060920-docsis.shtml - Patch | |
References | () http://www.kb.cert.org/vuls/id/123140 - US Government Resource | |
References | () http://www.osvdb.org/29034 - | |
References | () http://www.securityfocus.com/bid/20125 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/3722 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29054 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5665 - |
Information
Published : 2006-09-23 10:07
Updated : 2024-11-21 00:17
NVD link : CVE-2006-4950
Mitre link : CVE-2006-4950
CVE.ORG link : CVE-2006-4950
JSON object : View
Products Affected
cisco
- ios
CWE