HSMP Protocol Vulnerability

HIGH (10.0) No Patch (9569 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 6.66% chance of exploitation (percentile: 91%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

Hybrid Network cable modems are used in some older network configurations. This vulnerability allows remote attackers to compromise the system through the HSMP protocol due to a lack of authentication mechanism for administration.

Am I affected?

This is Hybrid Network cable modem software, so if you don't recognise the name, you're probably not affected. Version info not stated in advisory. Check with your network administrator or IT department if your organisation uses hybrid network cable modems.

Affected Products

SecurityFocus / Hybrid Network cable modem

How to fix

Contact the manufacturer directly for a patched version - exact details not specified in the advisory.
Immediate mitigations:
- Restrict network access to your hybrid network cable modem instance (firewall it from the public internet)
- Audit administration access for suspicious patterns
- Monitor for unauthorized protocol usage