First published: Fri Jan 28 2011(Updated: )
Cisco IOS 12.4(11)MD, 12.4(15)MD, 12.4(22)MD, 12.4(24)MD before 12.4(24)MD3, 12.4(22)MDA before 12.4(22)MDA5, and 12.4(24)MDA before 12.4(24)MDA3 on the Cisco Content Services Gateway Second Generation (aka CSG2) allows remote attackers to bypass intended access restrictions and intended billing restrictions by sending HTTP traffic to a restricted destination after sending HTTP traffic to an unrestricted destination, aka Bug ID CSCtk35917.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.4\(11\)md | |
Cisco IOS | =12.4\(15\)md | |
Cisco IOS | =12.4\(22\)md | |
Cisco IOS | =12.4\(22\)mda | |
Cisco IOS | =12.4\(24\)md | |
Cisco IOS | =12.4\(24\)md1 | |
Cisco IOS | =12.4\(24\)mda | |
Cisco Content Services Gateway Second Generation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0348 has a moderate severity rating due to its potential for unauthorized access and billing exploitation.
To fix CVE-2011-0348, upgrade to Cisco IOS versions 12.4(24)MD3, 12.4(22)MDA5, or 12.4(24)MDA3 or later.
CVE-2011-0348 affects Cisco IOS versions 12.4(11)MD, 12.4(15)MD, 12.4(22)MD, 12.4(22)MDA, and 12.4(24)MD before their respective patches.
CVE-2011-0348 is a vulnerability that allows remote attackers to bypass access restrictions.
Organizations using vulnerable Cisco IOS versions on their Content Services Gateway Second Generation devices are at risk from CVE-2011-0348.