Multiple Vulnerabilities in Cisco Products Could Allow for Unauthorized Access

ITS Advisory Number: 
2016-049
Date(s) Issued: 
Thursday, March 10, 2016
Subject: 
Multiple Vulnerabilities in Cisco Products Could Allow for Unauthorized Access
Overview: 

Multiple Cisco products are prone to multiple vulnerabilities that could allow for unauthorized access. Successful exploitation could potentially allow an attacker to take control of the affected system and perform unauthorized actions.

 

Systems Affected: 
  • Cisco ASA 5500 Series CSC-SSM devices running any 6.6 software releases prior to 6.6.1164.0 or without hotfix 1157
  • Cisco DPC3941 Wireless Residential Gateway with Digital Voice
  • Cisco DPC3939B Wireless Residential Voice Gateway
  • Cisco DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA
  • Cisco Cable Modem EPC2203 with Digital Voice
  • Cisco Cable Modem DPC2203 with Digital Voice
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Multiple Cisco products are prone to multiple vulnerabilities. Some of these vulnerabilities could allow for unauthorized access. These vulnerabilities are as follows:

 

  • A vulnerability was found in Cisco ASA 5500 Series CSC-SSM devices running any 6.6 software release prior to 6.6.1164.0 or without hotfix 1157. A successful exploitation could allow an allow an unauthenticated, remote attacker to cause exhaustion of available memory, system instability, and a reload of the affected system. This vulnerability is rated with a base CVSS Score of 7.8 [CVE-2016-1312]
  • vulnerabilities were found in Cisco DPC3941 wireless residential gateway with digital voice and Cisco DPC3939B wireless residential voice gateway.  A successful exploitation could allow an unauthenticated, remote attacker to access sensitive information on the affected device. This vulnerability is rated with a base CVSS Score of 7.8 [CVE-2016-1325]
  • A vulnerability in Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA could allow an unauthenticated, remote attacker to cause the device to become unresponsive and restart, creating a denial of service (DoS) condition. This vulnerability is rated with a base CVSS Score of 7.8 [CVE-2016-1326]
  • Vulnerabilities were found in Cisco Cable Modems Model DPC2203 and EPC2203 with digital voice; successful exploitation could allow an unauthenticated, remote attacker to exploit a buffer overflow and cause arbitrary code execution. This vulnerability is rated with a base CVSS Score of 10.0 [CVE-2016-1327]
Actions: 
  • After appropriate testing, apply applicable patches/updates provided by Cisco to the vulnerable systems.
  • Verify no unauthorized system modifications have occurred on system before applying patch.
  • Monitor intrusion detection systems for any signs of anomalous activity.
  • Unless required, limit external network access to affected products.