The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0669 | Vendor Advisory |
http://www.securitytracker.com/id/1029666 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/65052 | Third Party Advisory VDB Entry |
http://tools.cisco.com/security/center/viewAlert.x?alertId=32513 | Vendor Advisory |
http://secunia.com/advisories/56546 | |
http://osvdb.org/102318 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90614 |
Configurations
Information
Published : 2014-01-21 21:22
Updated : 2017-08-28 18:34
NVD link : CVE-2014-0669
Mitre link : CVE-2014-0669
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
cisco
- asr_5000_series_software