The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote malicious users to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco content engine 507_3.1 |
||
cisco content engine 507_4.0 |
||
cisco content engine 507_4.1 |
||
cisco content engine 560 |
||
cisco content engine 7320_4.0 |
||
cisco content engine 7320_4.1 |
||
cisco cache engine 505 2.4.0 |
||
cisco cache engine 505 3.0 |
||
cisco cache engine 550 |
||
cisco content distribution manager 4650 4.1 |
||
cisco content engine 507_2.2.0 |
||
cisco content engine 560_2.2.0 |
||
cisco content engine 560_4.0 |
||
cisco content engine 7320 |
||
cisco content engine 7320_3.1 |
||
cisco cache engine 550 2.4.0 |
||
cisco cache engine 570 2.2.0 |
||
cisco enterprise content delivery network software 4.0 |
||
cisco content distribution manager 4630 |
||
cisco content distribution manager 4630 4.0 |
||
cisco content distribution manager 4630 4.1 |
||
cisco content distribution manager 4650 |
||
cisco content engine 590 |
||
cisco content engine 590_2.2.0 |
||
cisco content engine 590_3.1 |
||
cisco content engine 590_4.0 |
||
cisco cache engine 570 2.4.0 |
||
cisco cache engine 570 3.0 |
||
cisco cache engine 570 570 |
||
cisco content router 4430 |
||
cisco content distribution manager 4650 4.0 |
||
cisco content engine 507 |
||
cisco content engine 560_3.1 |
||
cisco content engine 560_4.1 |
||
cisco content engine 590_4.1 |
||
cisco content engine 7320_2.2.0 |
||
cisco cache engine 550 2.2.0 |
||
cisco cache engine 550 3.0 |
||
cisco enterprise content delivery network software 4.1 |