Menu
Vulnerability exposes some Cisco home wireless devices to hacking

Vulnerability exposes some Cisco home wireless devices to hacking

Specially crafted HTTP requests could trigger remote code execution on the affected devices, Cisco said

Nine of Cisco's home and small office cable modems with router and wireless access point functionality need software updates to fix a critical vulnerability that could allow remote attackers to completely compromise them.

The company has shared the software updates with service providers, so users who obtained the affected equipment from their ISPs or other Cisco resellers should contact those organizations.

The vulnerability is a buffer overflow that results from incorrect validation of input in HTTP requests. If left unpatched, it allows remote, unauthenticated attackers to inject commands and execute arbitrary code with elevated privileges.

"An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device," Cisco said in a security advisory. "This vulnerability exists whether the device is configured in Router mode or Gateway mode."

The flaw received the highest criticality rating (10.0) on the Common Vulnerability Scoring System (CVSS), which means it can completely compromise the confidentiality, integrity and availability of the targeted device.

The affected wireless residential gateway products, as Cisco calls them, are: Cisco DPC3212 VoIP Cable Modem, Cisco DPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway, Cisco EPC3212 VoIP Cable Modem, Cisco EPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway, Cisco Model DPC3010 DOCSIS 3.0 8x4 Cable Modem, Cisco Model DPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA, Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA, Cisco Model EPC3010 DOCSIS 3.0 Cable Modem and Cisco Model EPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA.

There is currently no workaround for addressing this vulnerability aside from updating the software.

Users with direct Cisco service contracts can obtain the patched software versions directly from the company's website and those without such contracts should contact the Cisco Technical Assistance Center.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Networkingintrusionnetworking hardwareCisco SystemspatchesExploits / vulnerabilities

Featured

Slideshows

Reseller News welcomes industry figures for 2019 Hall of Fame lunch

Reseller News welcomes industry figures for 2019 Hall of Fame lunch

Reseller News welcomed 2018 inductees - Chris Simpson, Kendra Ross and Phill Patton - to the third running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing landscape of the technology industry in New Zealand, while outlining ways to attract a new breed of players to the ecosystem. Photos by Gino Demeer.

Reseller News welcomes industry figures for 2019 Hall of Fame lunch
Upcoming tech talent share insights at inaugural Emerging Leaders Forum 2019

Upcoming tech talent share insights at inaugural Emerging Leaders Forum 2019

The channel came together for the inaugural Reseller News Emerging Leaders Forum in New Zealand, created to provide a program that identifies, educates and showcases the upcoming talent of the ICT industry. Hosted as a half day event, attendees heard from industry champions as keynoters and panelists talked about future opportunities and leadership paths and joined mentoring sessions with members of the ICT industry Hall of Fame. The forum concluded with 30 Under 30 Tech Awards across areas of Sales, Entrepreneur, Marketing, Management, Technical and Human Resources. Photos by Gino Demeer.

Upcoming tech talent share insights at inaugural Emerging Leaders Forum 2019
Show Comments