A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device. The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2020-06-18T02:21:23.181506Z
Updated: 2024-11-15T16:59:30.320Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3244
Vulnrichment
Updated: 2024-08-04T07:30:58.066Z
NVD
Status : Modified
Published: 2020-06-18T03:15:11.370
Modified: 2024-11-21T05:30:38.713
Link: CVE-2020-3244
Redhat
No data.