Executive Summary

Summary
Title Cisco Content Services Gateway Vulnerabilities
Informations
Name cisco-sa-20110126-csg2 First vendor Publication 2011-01-26
Vendor Cisco Last vendor Modification 2011-01-26
Severity (Vendor) N/A Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A service policy bypass vulnerability exists in the Cisco Content Services Gateway - Second Generation (CSG2), which runs on the Cisco Service and Application Module for IP (SAMI). Under certain configurations this vulnerability could allow:

* Customers to access sites that would normally match a billing policy to be accessed without being charged to the end customer
* Customers to access sites that would normally be denied based on configured restriction policies

Additionally, Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

Workarounds that mitigate these vulnerabilities are not available.

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2016-04-26 21:33:56
  • Multiple Updates
2013-05-11 00:42:40
  • Multiple Updates