First published: Tue Jul 06 2010(Updated: )
The Cisco Content Services Switch (CSS) 11500 with software 08.20.1.01 conveys authentication data through ClientCert-* headers but does not delete client-supplied ClientCert-* headers, which might allow remote attackers to bypass authentication via crafted header data, as demonstrated by a ClientCert-Subject-CN header, aka Bug ID CSCsz04690.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Content Services Switch 11500 firmware | =08.20.1.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1575 is considered a high-severity vulnerability due to its potential for authentication bypass.
To fix CVE-2010-1575, it is recommended to upgrade the Cisco Content Services Switch to a patched version that addresses this vulnerability.
CVE-2010-1575 can be exploited through crafted headers that bypass the authentication mechanism.
CVE-2010-1575 specifically affects the Cisco Content Services Switch 11500 running software version 08.20.1.01.
CVE-2010-1575 involves the retention of client-supplied ClientCert-* headers, allowing attackers to manipulate authentication data.