Lucene search

K
ciscoCiscoCISCO-SA-20140122-CVE-2014-0669
HistoryJan 22, 2014 - 7:10 p.m.

Cisco ASR 5000 Series Gateway GPRS Support Node Traffic Bypass Vulnerability

2014-01-2219:10:26
tools.cisco.com
29

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.9%

A vulnerability in the Wireless Session Protocol (WSP) function of Cisco ASR 5000 Series Gateway GPRS Support Node (GGSN) could allow an unauthenticated, remote attacker to browse free of charge instead of being redirected to a Top-Up portal.

The vulnerability is due to incorrect processing of certain WSP packets. An attacker could exploit this vulnerability by sending crafted WSP packets. An exploit could allow the attacker to browse free of charge instead of being redirected to a Top-Up portal.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker my need access to trusted, internal networks to send crafted WSP packets to a targeted device. This access requirement may reduce the likelihood of a successful exploit.

Affected configurations

Vulners
Node
ciscoasr_5000_series_softwareMatchany
OR
ciscoasr_9904Match5000_series_software

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.9%

Related for CISCO-SA-20140122-CVE-2014-0669