Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x8mp-q875-3hv2

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.

The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.

EPSS

Процентиль: 72%
0.00702
Низкий

Связанные уязвимости

nvd
около 12 лет назад

The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.

EPSS

Процентиль: 72%
0.00702
Низкий