The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://tools.cisco.com/security/center/viewAlert.x?alertId=32513 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90614 | vdb entry |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0669 | vendor advisory |
http://osvdb.org/102318 | vdb entry |
http://www.securityfocus.com/bid/65052 | third party advisory vdb entry |
http://secunia.com/advisories/56546 | third party advisory |
http://www.securitytracker.com/id/1029666 | third party advisory vdb entry |