CVE-2014-0669

N/A Unknown
Published: January 22, 2014 Modified: April 29, 2026
View on NVD

Description

The Wireless Session Protocol (WSP) feature in the Gateway GPRS Support Node (GGSN) component on Cisco ASR 5000 series devices allows remote attackers to bypass intended Top-Up payment restrictions via unspecified WSP packets, aka Bug ID CSCuh28371.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/102318
Source: psirt@cisco.com
http://www.securityfocus.com/bid/65052
Source: psirt@cisco.com
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029666
Source: psirt@cisco.com
Third Party Advisory VDB Entry
http://osvdb.org/102318
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/56546
Source: af854a3a-2127-422b-91ae-364da2661108
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0669
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tools.cisco.com/security/center/viewAlert.x?alertId=32513
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/65052
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029666
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90614
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
72th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

cisco