Cisco DPC3010/DPC3212/EPC3010/EPC3212 HTTP Request input validation

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.7 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical was found in Cisco DPC3010, DPC3212, EPC3010 and EPC3212. The affected element is an unknown function of the component HTTP Request Handler. Such manipulation leads to input validation. This vulnerability is uniquely identified as CVE-2014-3306. No exploit exists. It is advisable to implement a patch to correct this issue.
Details
A vulnerability was found in Cisco DPC3010, DPC3212, EPC3010 and EPC3212 and classified as critical. Affected by this issue is an unknown function of the component HTTP Request Handler. The manipulation with an unknown input leads to a input validation vulnerability. Using CWE to declare the problem leads to CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. Impacted is confidentiality, integrity, and availability. CVE summarizes:
The web server on Cisco DPC3010, DPC3212, DPC3825, DPC3925, DPQ3925, EPC3010, EPC3212, EPC3825, and EPC3925 Wireless Residential Gateway products allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCup40808.
The weakness was disclosed 07/16/2014 by Chris Watts as ciscosa-20140716-cm / CSCup40808 as confirmed advisory (Website). The advisory is shared for download at tools.cisco.com. This vulnerability is handled as CVE-2014-3306 since 05/07/2014. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available.
The commercial vulnerability scanner Qualys is able to test this issue with plugin 43412 (Cisco Wireless Residential Gateway Remote Code Execution Vulnerability (ciscosa-20140716-cm)).
Applying a patch is able to eliminate this problem.
The vulnerability is also documented in the databases at X-Force (94639), SecurityFocus (BID 68673†), SecurityTracker (ID 1030598†) and Vulnerability Center (SBV-45503†). If you want to get best quality of vulnerability data, you may have to visit VulDB.
Affected
- Cisco DPC3010 DOCSIS 3.0 8x4 Cable Modem
- Cisco DPC3212 VoIP Cable Modem
- Cisco EPC3010 DOCSIS 3.0 Cable Modem
- Cisco EPC3212 VoIP Cable Modem
Product
Vendor
Name
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 8.7
VulDB Base Score: 10.0
VulDB Temp Score: 8.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
05/07/2014 🔍07/16/2014 🔍
07/16/2014 🔍
07/16/2014 🔍
07/16/2014 🔍
07/17/2014 🔍
07/17/2014 🔍
07/17/2014 🔍
12/17/2024 🔍
Sources
Vendor: cisco.comAdvisory: ciscosa-20140716-cm / CSCup40808
Researcher: Chris Watts
Status: Confirmed
CVE: CVE-2014-3306 (🔍)
GCVE (CVE): GCVE-0-2014-3306
GCVE (VulDB): GCVE-100-67172
X-Force: 94639 - Multiple Cisco Wireless Residential Gateway products buffer overflow, High Risk
SecurityFocus: 68673 - Multiple Cisco Wireless Residential Gateway Products Remote Code Execution Vulnerability
SecurityTracker: 1030598 - Cisco Cable Modem Buffer Overflow Lets Remote Users Execute Arbitrary Code
Vulnerability Center: 45503 - [ciscosa-20140716-cm] Cisco Wireless Residential Gateway 3.0 Remote Code Execute via a Crafted HTTP Request, Critical
Entry
Created: 07/17/2014 11:19Updated: 12/17/2024 08:55
Changes: 07/17/2014 11:19 (69), 06/02/2017 07:57 (3), 12/17/2024 08:55 (18)
Complete: 🔍
Cache ID: 216:99C:103
No comments yet. Languages: en.
Please log in to comment.