Cisco Wireless Residential Gateway Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1030599|
SecurityTracker URL: http://securitytracker.com/id/1030599
(Links to External Site)
Date: Jul 16 2014
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
A vulnerability was reported in Cisco Wireless Residential Gateway. A remote user can execute arbitrary code on the target system.|
A remote user can send a specially crafted HTTP request to the target device to trigger a buffer overflow and execute arbitrary code on the target system.
The vendor has assigned bug ID CSCup40808 to this vulnerability.
The following models are affected:
Cisco DPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
Cisco EPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
Cisco Model DPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA
Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA
Cisco Model EPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA
Chris Watts of Tech Analysis reported this vulnerability.
A remote user can execute arbitrary code on the target system.|
The vendor has issued a fix.|
The vendor's advisory is available at:
Vendor URL: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ciscosa-20140716-cm (Links to External Site)
Source Message Contents
Subject: Cisco Security Advisory: Cisco Wireless Residential Gateway Remote Code Execution Vulnerability|
-----BEGIN PGP SIGNED MESSAGE-----
Cisco Wireless Residential Gateway Remote Code Execution Vulnerability
Advisory ID: ciscosa-20140716-cm
For Public Release 2014 July 16 16:00 UTC (GMT)
A vulnerability in the web server used in multiple Cisco Wireless Residential Gateway products could allow an unauthenticated, remote attacker to exploit a buffer overflow and cause arbitrary code execution.
The vulnerability is due to incorrect input validation for HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device.
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
-----END PGP SIGNATURE-----
cust-security-announce mailing list
To unsubscribe, send the command "unsubscribe" in the subject of your message to firstname.lastname@example.org