Guest

Preview Tool

Cisco Bug: CSCvs83392 - Cisco ASR 5000 Enhanced Charging Service Rule Bypass Vulnerability

Last Modified

Jun 17, 2020

Products (2)

  • Cisco ASR 5000 Series
  • Cisco ASR 5500

Known Affected Releases

21.18.0 21.4.5

Description (partial)

Symptom:
A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device.

The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. 

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr5k-ecs-bypass-2LqfPCL

Conditions:
At the time of publication, this vulnerability affected Cisco ASR 5000 Series Aggregation Services Routers if they were running a software release earlier than Release 21.18.0 and had an ECS rule configured to match on the CONNECT HTTP method.

At the time of publication, Cisco ASR 5000 Aggregation Services Routers software releases 21.18.0 and later contained the fix for this vulnerability.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.