Cisco ASR 5000 Series Gateway GPRS Support Node Traffic Bypass Vulnerability

Cisco-SA-20140122-CVE-2014-0669 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the Wireless Session Protocol (WSP) function of Cisco ASR 5000 Series Gateway GPRS Support Node (GGSN) could allow an unauthenticated,  remote attacker to browse free of charge instead of being redirected to a Top-Up portal. The vulnerability is due to incorrect processing of certain WSP packets. An attacker could exploit this vulnerability by sending crafted WSP packets. An exploit could allow the attacker to browse free of charge instead of being redirected to a Top-Up portal. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker my need access to trusted, internal networks to send crafted WSP packets to a targeted device. This access requirement may reduce the likelihood of a successful exploit.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-0669
Cisco Bug IDsCSCuh28371
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C

Products with public affected evidence