Vulnslist

find the latest Cisco vulnerabilities

Cisco Wireless Residential Gateway with EDVA Denial of Service Vulnerability

cisco-sa-20160309-cmdos · High · Published · Updated

A vulnerability in the web-based administration interface of Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA could allow an unauthenticated, remote attacker to cause the device to become unresponsive and restart, creating a denial of service (DoS) condition.   The vulnerability is due to improper handling, processing, and termination of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to management-enabled interfaces of an affected system. Cisco has released software updates to its service provider customers that address the vulnerability described in this advisory. Prior to contacting Cisco TAC, customers are advised to contact their service providers to confirm the software deployed by the service provider includes the fix that addresses this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160309-cmdos

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2016-1326
Cisco Bug IDsCSCup48105
CVSS ScoreBase 7.8
Base 7.8 AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
Product Names From Source
Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA

Related Products

Product CVE Evidence
Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA CVE-2016-1326 Cisco OpenVuln