Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 34
  1. #16


    Member Since
    Oct 16, 2010
    Location
    Brentwood Bay, BC, Canada
    Posts
    6,147
    Good grief!!!

    I just noticed that the updated Cisco DPC3825 our ISP just supplied us a few months ago is also on that list, but under the

    Vulnerable Products

    The following Cisco products are affected by this vulnerability:
    Cisco DPC3212 VoIP Cable Modem
    Cisco DPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
    Cisco EPC3212 VoIP Cable Modem
    Cisco EPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
    Cisco Model DPC3010 DOCSIS 3.0 8x4 Cable Modem
    Cisco Model DPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA
    Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA
    Cisco Model EPC3010 DOCSIS 3.0 Cable Modem
    Cisco Model EPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA


    Advisory ID: ciscosa-20140716-cm
    First Published: 2014 July 16 16:00 GMT
    Last Updated: 2014 July 18 17:55 GMT
    Version 1.1: Final

    https://tools.cisco.com/security/cen...sa-20140716-cm

    But, no sweat…

    images.jpeg



    EDIT:
    PS: [quote] Cisco has released software updates that address this vulnerability.

    More info:
    https://tools.cisco.com/security/cen...sa-20140716-cm







    - Patrick
    ==========

  2. #17

    chscag's Avatar
    Member Since
    Jan 23, 2008
    Location
    Keller, Texas
    Posts
    52,672
    Specs:
    Late 2013 27" iMac, 10.5" iPad Pro, iPhone 6s+, iPhone 7+, Numerous iPods, Sierra
    Hey Patrick... nice of you to post a portrait of yourself! (You knew that was coming... LOL) I think I'll copy it to our "Mug Shot" forum with your name. (Just kidding.)

    On a serious note... I have to agree with Bryan about using a router whether or not it's needed at this time. The hardware firewall provided by a good router is just another safety net in the chain of things.

    As for a router recommendation, I did some extensive looking around and reading of reviews and came up with an "Archer TP-Link C7 model AC 1750" ($86.00 from B&H in NY). Dual band and includes two USB ports for a printer.

  3. #18


    Member Since
    Jan 08, 2017
    Posts
    11
    Quote Originally Posted by RadDave View Post
    Hi again Gramek - a LOT of questions above. First, a modem uses Data Over Cable Service Interface Specification (DOCSIS), a telecommunications standard that provides Internet access. The DOCSIS standard is now v. 3 and offers the 'security' described in the quote below (Source) - my ISP is Time Warner and I rent their modem which was replaced last year w/ the Arris model shown below; my plan is 100 Mbps DL speed ideally - just check my speeds at Speedtest and got nearly 80 Mbps DL which serves my streaming needs (see pics below) - go to the link and check your speeds; also make sure that your modem is the newest model offered by your ISP, and hopefully up to current DOCSIS standards.

    NOW, the modem does not have a robust firewall, thus the router recommendation by several of us for added security; plus, the router offers many other features (some outlined previously), including a wireless Wi-Fi network, if you do decide to setup one. Let us know if you are still interested in obtaining a router and further comments can be offered. P.S. most ISPs (or you can purchased one) offer a combo device that includes a modem and a router, so just another option. Dave
    Hello and thank you and sorry!

    Thank you for explaining the terminology!
    And really good site to test my speed that is... well, I thought I had pretty good, but it pales in comparison to yours.
    Mine is Download 21.47 and upload 2.14. Well, it serves me well so I have no complaints.

    Yes, after reading around I really should get router, if only for peace of mind.



    Quote Originally Posted by pm-r View Post
    Well, the OP can always do some googling:
    https://www.google.ca/search?client=...CcPM8gev_pbIDw

    And come up with some reports and tests like this:
    Security Issue: SL subscriber's using Cisco Residential Gateways

    Products Confirmed Not Vulnerable
    -Cisco Model DCP2100 DOCSIS 2.0 Cable Modem
    -Cisco Model DPC3008 DOCSIS 3.0 8x4 Cable Modem
    -Cisco Model DPC3208 8x4 DOCSIS 3.0 Cable Modem
    -Cisco Model DPC3828 DOCSIS 3.0 8x4 Residential Wireless Gateway
    -Cisco Model DPC3928 DOCSIS 3.0 8x4 Wireless Residential Gateway
    -Cisco Model EPC2425 EuroDOCSIS 2.0 Cable Modem
    -Cisco Model EPC3008 EuroDOCSIS 3.0 8x4 VoIP Cable Modem
    -Cisco Model EPC3208 8x4 DOCSIS 3.0 Cable Modem
    -Cisco Model EPC3828 EuroDOCSIS 3.0 8x4 Residential Wireless Gateway
    -Cisco Model EPC3928 EuroDOCSIS 3.0 8x4 Wireless Residential Gateway
    -Scientific Atlanta DPR2320 Cable Modem
    -Scientific Atlanta DPX 2000 Cable Modem
    -Scientific Atlanta EPC2203 VoIP Cable Modem
    -WebSTAR DPX2100 Cable Modem
    -WebSTAR DPX2203C VoIP Cable Modem
    -WebSTAR EPC2100R2 Cable Modem
    -WebSTAR EPR2325 EuroDOCSIS Residential Gateway with Wireless Access Point


    [bold mine]

    http://www.dslreports.com/forum/r294...ntial-Gateways

    See also:
    https://tools.cisco.com/security/cen...sa-20140716-cm



    - Patrick
    ==========

    Quote Originally Posted by pm-r View Post
    Good grief!!!

    I just noticed that the updated Cisco DPC3825 our ISP just supplied us a few months ago is also on that list, but under the

    Vulnerable Products

    The following Cisco products are affected by this vulnerability:
    Cisco DPC3212 VoIP Cable Modem
    Cisco DPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
    Cisco EPC3212 VoIP Cable Modem
    Cisco EPC3825 8x4 DOCSIS 3.0 Wireless Residential Gateway
    Cisco Model DPC3010 DOCSIS 3.0 8x4 Cable Modem
    Cisco Model DPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA
    Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA
    Cisco Model EPC3010 DOCSIS 3.0 Cable Modem
    Cisco Model EPC3925 8x4 DOCSIS 3.0 with Wireless Residential Gateway with EDVA


    Advisory ID: ciscosa-20140716-cm
    First Published: 2014 July 16 16:00 GMT
    Last Updated: 2014 July 18 17:55 GMT
    Version 1.1: Final

    https://tools.cisco.com/security/cen...sa-20140716-cm

    But, no sweat…

    images.jpeg


    EDIT:
    PS:
    Cisco has released software updates that address this vulnerability.

    More info:
    https://tools.cisco.com/security/cen...sa-20140716-cm







    - Patrick
    ==========


    I actually found this security issue myself only bit ago. 2016, March

    https://tools.cisco.com/security/cen...-20160309-cmre

    The following Cisco product are vulnerable:

    Cisco Cable Modem with Digital Voice Model DPC2203
    Cisco Cable Modem with Digital Voice Model EPC2203


    Noooo.... -_-
    That SHOULD be my Scientific Atlanta EPC2203? Only with different name?

    In your opinion, my ISP would fix this mess themselves by downloading and stuffing this upgrade into all modems under their control? Nothing for me to do or check myself? Out of my hands, trust ISP in this case?




    Quote Originally Posted by chscag View Post
    Hey Patrick... nice of you to post a portrait of yourself! (You knew that was coming... LOL) I think I'll copy it to our "Mug Shot" forum with your name. (Just kidding.)

    On a serious note... I have to agree with Bryan about using a router whether or not it's needed at this time. The hardware firewall provided by a good router is just another safety net in the chain of things.

    As for a router recommendation, I did some extensive looking around and reading of reviews and came up with an "Archer TP-Link C7 model AC 1750" ($86.00 from B&H in NY). Dual band and includes two USB ports for a printer.
    Thank you for advice! Router it will be then. I need to check the shops near me to see what they have. TP-Link should be one brand sold around here.
    Last edited by Gramek; 01-10-2017 at 02:59 PM.

  4. #19

    chscag's Avatar
    Member Since
    Jan 23, 2008
    Location
    Keller, Texas
    Posts
    52,672
    Specs:
    Late 2013 27" iMac, 10.5" iPad Pro, iPhone 6s+, iPhone 7+, Numerous iPods, Sierra
    In your opinion, ISP provider would fix this mess themselves by downloading and stuffing this upgrade into all modems under their control? Nothing for me to do or check myself? Out of my hands, trust ISP in this case?
    Lots of luck with that thought. Most ISPs have no idea what a Mac is much less provide you with support for your modem. I have yet to run across an ISP that was really helpful in resolving connection problems, be it for a modem or router they supplied. If your modem requires a firmware update it will be up to you to hunt it down and install it. Sometimes, the ISP can provide an over the air update (as Verizon FIOS does) but that's not the norm.

  5. #20


    Member Since
    Jan 08, 2017
    Posts
    11
    Quote Originally Posted by chscag View Post
    Lots of luck with that thought. Most ISPs have no idea what a Mac is much less provide you with support for your modem. I have yet to run across an ISP that was really helpful in resolving connection problems, be it for a modem or router they supplied. If your modem requires a firmware update it will be up to you to hunt it down and install it. Sometimes, the ISP can provide an over the air update (as Verizon FIOS does) but that's not the norm.
    You are dealing with an amateur here so...


    A vulnerability in the web server used in the Cisco Cable Modem with Digital Voice Model DPC2203 could allow an unauthenticated, remote attacker to exploit a buffer overflow and cause arbitrary code execution.

    The vulnerability is due to improper input validation for HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device.

    Cisco has released software updates to its service provider customers that address the vulnerability described in this advisory. Prior to contacting Cisco TAC, customers are advised to contact their service providers to confirm the software deployed by the service provider includes the fix that addresses this vulnerability. Workarounds that mitigate this vulnerability are not available.


    So if I'm using Mac, this security patch would not be installed into my modem? Does it really matter what is attached to the modem? I was under impression ISP would just shove new upgraded firmware into modem through their connection and that's that?

  6. #21

    chscag's Avatar
    Member Since
    Jan 23, 2008
    Location
    Keller, Texas
    Posts
    52,672
    Specs:
    Late 2013 27" iMac, 10.5" iPad Pro, iPhone 6s+, iPhone 7+, Numerous iPods, Sierra
    So if I'm using Mac, this security patch would not be installed into my modem? Does it really matter what is attached to the modem? I was under impression ISP would just shove new upgraded firmware into modem through their connection and that's that?
    No, in the case you cited above, that should be an over the air firmware update to the modem since it involves a security vulnerability in the ISP's system. It just so happens that their customer supported gear is provided by Cisco. Security patches are provided by means of a firmware update which are applicable to the hardware. That means it doesn't matter whether you're on a Mac, PC, or Linux box, as the hardware interfaces only. You should be OK.

    The support I was referring to above in my post would be concerning connection problems and trying to resolve them with your ISP. As stated, most ISPs are not trained in Mac support.

  7. #22


    Member Since
    Jan 08, 2017
    Posts
    11
    Quote Originally Posted by chscag View Post
    No, in the case you cited above, that should be an over the air firmware update to the modem since it involves a security vulnerability in the ISP's system. It just so happens that their customer supported gear is provided by Cisco. Security patches are provided by means of a firmware update which are applicable to the hardware. That means it doesn't matter whether you're on a Mac, PC, or Linux box, as the hardware interfaces only. You should be OK.

    The support I was referring to above in my post would be concerning connection problems and trying to resolve them with your ISP. As stated, most ISPs are not trained in Mac support.
    Thank you and sorry! I'm worrywart with flu remains so I get a bit over excitable.

    Are there many issues when modem/router from ISP and user's Mac do not mesh well?

  8. #23

    chscag's Avatar
    Member Since
    Jan 23, 2008
    Location
    Keller, Texas
    Posts
    52,672
    Specs:
    Late 2013 27" iMac, 10.5" iPad Pro, iPhone 6s+, iPhone 7+, Numerous iPods, Sierra
    Are there many issues when modem/router from ISP and user's Mac do not mesh well?
    No, not really. Keep in mind that a modem and router are hardware devices designed to work with various types of networks (internet). The operating system comes into play when the connection is not working right and you then ask for support from your ISP. Unless the ISP support person understands Macs and OS X, he/she will try to give you instructions based on Windows. And when you tell them you're on a Mac, they will then probably blame the problem on your Mac. I've been there and done that many times.

  9. #24


    Member Since
    Jan 08, 2017
    Posts
    11
    Quote Originally Posted by chscag View Post
    No, not really. Keep in mind that a modem and router are hardware devices designed to work with various types of networks (internet). The operating system comes into play when the connection is not working right and you then ask for support from your ISP. Unless the ISP support person understands Macs and OS X, he/she will try to give you instructions based on Windows. And when you tell them you're on a Mac, they will then probably blame the problem on your Mac. I've been there and done that many times.
    So it's likely better to not mention Mac as long as possible or else ISP guys get lazy and blame it all on that.. but if you don't mention it, they keep giving Windows advice.

    Again, thank you for giving advice regarding that modem security issue. For years I saw modem as infallible box that can't be security compromised and suddenly I hear it can have vulnerabilities. But ISPs should know about such issues and fix them when they come themselves and I shouldn't worry about things out of my hands?

  10. #25

    chscag's Avatar
    Member Since
    Jan 23, 2008
    Location
    Keller, Texas
    Posts
    52,672
    Specs:
    Late 2013 27" iMac, 10.5" iPad Pro, iPhone 6s+, iPhone 7+, Numerous iPods, Sierra
    But ISPs should know about such issues and fix them when they come themselves and I shouldn't worry about things out of my hands?
    Truthfully, ISPs are not about to spend time and money if they can get away with it. In your case, it involves a security issue which they know can get them into trouble if they don't fix it. Let them worry about it at that level as long as they keep providing secure access for you and their other subscribers.

  11. #26


    Member Since
    Jan 08, 2017
    Posts
    11
    Quote Originally Posted by chscag View Post
    Truthfully, ISPs are not about to spend time and money if they can get away with it. In your case, it involves a security issue which they know can get them into trouble if they don't fix it. Let them worry about it at that level as long as they keep providing secure access for you and their other subscribers.
    They have to move because Cisco released it publicly and it someone notices, it could be embarrassing if it comes out? I went to check those modem settings in the ip address it seems to give access to http://192.168.100.1/ , but those numbers and words tell me nothing and one tab demands password I rather not even try. So yeah, better not touch this thing any longer. Thank you!
    Last edited by chscag; 01-10-2017 at 07:54 PM. Reason: language

  12. #27


    Member Since
    Oct 16, 2010
    Location
    Brentwood Bay, BC, Canada
    Posts
    6,147
    So yeah, better not touch this thing any longer. Thank you!
    There's a very good chance that your modem that you rent from your ISP has been updated as needed but probably done so remotely and in the wee small hours of the morning when you were sound asleep and probably done so quite a while ago.

    You could always give them a call if you want to really check.






    - Patrick
    ==========

  13. #28

    RadDave's Avatar
    Member Since
    Jan 20, 2012
    Location
    North Carolina
    Posts
    4,044
    Specs:
    MBP 13" (2013); 8 GB RAM; SSD 256 GB; OS 10.12
    Quote Originally Posted by Gramek View Post
    They have to move because Cisco released it publicly and it someone notices, it could be embarrassing if it comes out? I went to check those modem settings in the ip address it seems to give access to http://192.168.100.1/ , but those numbers and words tell me nothing and one tab demands password I rather not even try. So yeah, better not touch this thing any longer. Thank you!
    Hi Gramek - I've been out of the loop for a page or so, but you are delving into issues that I'm not sure you really know - true?

    If you understand IP addressing, e.g. IPv4, then IP addresses may be assigned to a number of locales, especially public vs. private - now there are three reserved for private IP addressing as shown in the chart below (Source) - many router producers use the 192.168.x.x range for their use, i.e. for communicating w/ their configuration program on your computer - that is the type of URL you left above - for myself, it brought me to my Arris modem but provided no 'dangerous' information - for others, it might enter their router's configuration app - NOW, one of the other ranges is 10.x.x.x which is used by Apple routers, such as the one I own (an AirPort Extreme) - my suggestion to you is not to post URLs that you don't understand - other non-suspecting members may click on one that is potentially malicious - just saying. Dave
    .
    Screen Shot 2017-01-10 at 7.50.01 PM.png
    If you are helped, increase the reputation of the poster -

  14. #29


    Member Since
    Oct 16, 2010
    Location
    Brentwood Bay, BC, Canada
    Posts
    6,147
    my suggestion to you is not to post URLs that you don't understand - other non-suspecting members may click on one that is potentially malicious - just saying. Dave

    Aggghhh and huuugh??? Dave, the sky is falling, run and protect yourself and others.


    Now that you're hiding in your protective cave, I think it should be pointed out that those same access URLs must be listed and posted in thousands of different webpages and help forums.

    Just saying before some go off with incorrect info and get led to believe something that isn't true.

    My God, some will be advocating building yet another wall to protect all of us Internet connected Mac users.






    - Patrick
    ==========

  15. #30

    RadDave's Avatar
    Member Since
    Jan 20, 2012
    Location
    North Carolina
    Posts
    4,044
    Specs:
    MBP 13" (2013); 8 GB RAM; SSD 256 GB; OS 10.12
    Quote Originally Posted by pm-r View Post
    Aggghhh and huuugh??? Dave, the sky is falling, run and protect yourself and others.


    Now that you're hiding in your protective cave, I think it should be pointed out that those same access URLs must be listed and posted in thousands of different webpages and help forums.

    Just saying before some go off with incorrect info and get led to believe something that isn't true.

    My God, some will be advocating building yet another wall to protect all of us Internet connected Mac users.
    NOW Patrick - LOL! My main point is that a poster putting up URLS and/or links should understand and be aware of what is being offered to the 'public' - you obviously know the rationale, but others less knowlegdeable may not? Dave
    If you are helped, increase the reputation of the poster -

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Firewall Settings
    By Japple1 in forum Security Awareness
    Replies: 4
    Last Post: 12-18-2015, 07:19 PM
  2. How do you change firewall settings?
    By Noels in forum Switcher Hangout
    Replies: 6
    Last Post: 04-09-2008, 10:50 AM
  3. Limewire and Firewall settings...
    By A_Alire in forum Internet, Networking, and Wireless
    Replies: 2
    Last Post: 10-09-2007, 08:03 AM
  4. Firewall settings
    By gemigene in forum Switcher Hangout
    Replies: 8
    Last Post: 12-12-2006, 09:54 AM
  5. firewall settings with airport
    By IChing in forum Internet, Networking, and Wireless
    Replies: 0
    Last Post: 01-03-2005, 02:54 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •