Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A vulnerability in the peer-to-peer message processing functionality of Cisco Packet Data Network Gateway could allow an unauthenticated, remote attacker to cause the Session Manager (SESSMGR) process on an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect validation of peer-to-peer packet headers. An attacker could exploit this vulnerability by sending a crafted peer-to-peer packet through an affected device. A successful exploit could allow the attacker to cause the SESSMGR process on the affected device to restart unexpectedly, which could briefly impact traffic while the SESSMGR process restarts and result in a DoS condition. Cisco Bug IDs: CSCvg88786.
CVSS Information
N/A
Vulnerability Type
输入验证不恰当
Vulnerability Title
Cisco Packet Data Network Gateway 输入验证漏洞
Vulnerability Description
Cisco Packet Data Network Gateway是美国思科(Cisco)公司的一款用于4G移动核心网络中的分组数据网络网关设备。 Cisco Packet Data Network Gateway中的对等网络消息处理存在输入验证漏洞,该漏洞源于程序没有正确的校验对等网络数据包头。远程攻击者可通过发送对等网络数据包利用该漏洞造成拒绝服务(Session Manager进程重启)。
CVSS Information
N/A
Vulnerability Type
N/A