CVE-2020-3244
Summary
| CVE | CVE-2020-3244 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-06-18 03:15:00 UTC |
| Updated | 2021-09-17 19:00:00 UTC |
| Description | A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device. The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Asr 5000 | - | All | All | All |
| Hardware | Cisco | Asr 5000 | - | All | All | All |
| Hardware | Cisco | Asr 5500 | - | All | All | All |
| Hardware | Cisco | Asr 5500 | - | All | All | All |
| Hardware | Cisco | Asr 5700 | - | All | All | All |
| Hardware | Cisco | Asr 5700 | - | All | All | All |
| Operating System | Cisco | Staros | All | All | All | All |
| Operating System | Cisco | Staros | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco ASR 5000 Series Aggregation Services Routers Enhanced Charging Service Rule Bypass Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.