Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

Prevent hacking cable modems with DOCSIS config files

Anyone know of ways to prevent hacking cable modems that run DOCSIS config files?

Thnx. Blm

3 REPLIES
New Member

Re: Prevent hacking cable modems with DOCSIS config files

A few different ways to help ensure. My first way is to *not* use Motorola Surfboards as your primary CPE modems. There is a lot of stuff out there designed to work specifically with Surfboard modems. Do a google search for "uncapping surfboard" - it's scary. I personally have not been able to uncap an RCA cable modem after many hours of trying to do so.

The second is to enable the shared secret in your config file, and on the UBR. Pick a non-dictionary word, and from the cable interface, type "shared secret password" where password is your specific password. Then, type the same password in your config file generator.

There are other little things you can do, but these two do the most for you.

HTH,

Justin

New Member

Re: Prevent hacking cable modems with DOCSIS config files

Justin, Thanks for the reply. Actually, even with strong pwds in the config, the cable modems are still compromised. Any other suggestions you can share would be appeciated ... Thanks!

Blm

New Member

Re: Prevent hacking cable modems with DOCSIS config files

Maybe they're being compromised because the UBR isn't verifying the secret?

Does this apply to you?

http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtml

678
Views
0
Helpful
3
Replies
CreatePlease login to create content