First published: Tue Jul 25 2017(Updated: )
A vulnerability in the gateway GPRS support node (GGSN) of Cisco ASR 5000 Series Aggregation Services Routers 17.3.9.62033 through 21.1.2 could allow an unauthenticated, remote attacker to redirect HTTP traffic sent to an affected device. More Information: CSCvc67927.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 5000 Series Software | =17.3.9.62033 | |
Cisco ASR 5000 Series Software | =17.7.5 | |
Cisco ASR 5000 Series Software | =19.6.3 | |
Cisco ASR 5000 Series Software | =20.1.2 | |
Cisco ASR 5000 Series Software | =20.2.12 | |
Cisco ASR 5000 Series Software | =21.0.1 | |
Cisco ASR 5000 Series Software | =21.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-6612 is rated as high, with a CVSS score of 8.6.
To fix CVE-2017-6612, upgrade the Cisco ASR 5000 Series Software to a version that is not affected by this vulnerability.
CVE-2017-6612 allows an unauthenticated, remote attacker to redirect HTTP traffic sent to the affected Cisco ASR 5000 devices.
The affected versions of Cisco ASR 5000 Series Software include 17.3.9.62033 through 21.1.2.
CVE-2017-6612 vulnerabilities exist in the gateway GPRS support node (GGSN) of the Cisco ASR 5000 Series.