Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
New Member

Prevent hacking cable modems with DOCSIS config files

Anyone know of ways to prevent hacking cable modems that run DOCSIS config files?

Thnx. Blm

3 REPLIES
New Member

Re: Prevent hacking cable modems with DOCSIS config files

A few different ways to help ensure. My first way is to *not* use Motorola Surfboards as your primary CPE modems. There is a lot of stuff out there designed to work specifically with Surfboard modems. Do a google search for "uncapping surfboard" - it's scary. I personally have not been able to uncap an RCA cable modem after many hours of trying to do so.

The second is to enable the shared secret in your config file, and on the UBR. Pick a non-dictionary word, and from the cable interface, type "shared secret password" where password is your specific password. Then, type the same password in your config file generator.

There are other little things you can do, but these two do the most for you.

HTH,

Justin

New Member

Re: Prevent hacking cable modems with DOCSIS config files

Justin, Thanks for the reply. Actually, even with strong pwds in the config, the cable modems are still compromised. Any other suggestions you can share would be appeciated ... Thanks!

Blm

New Member

Re: Prevent hacking cable modems with DOCSIS config files

Maybe they're being compromised because the UBR isn't verifying the secret?

Does this apply to you?

http://www.cisco.com/warp/public/707/cmts-MD5-bypass-pub.shtml

683
Views
0
Helpful
3
Replies
CreatePlease to create content