7.5
CVSSv2

CVE-2002-0778

Published: 12/08/2002 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote malicious users to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco content engine 507_3.1

cisco content engine 507_4.0

cisco content engine 507_4.1

cisco content engine 560

cisco content engine 7320_4.0

cisco content engine 7320_4.1

cisco cache engine 505 2.4.0

cisco cache engine 505 3.0

cisco cache engine 550

cisco content distribution manager 4650 4.1

cisco content engine 507_2.2.0

cisco content engine 560_2.2.0

cisco content engine 560_4.0

cisco content engine 7320

cisco content engine 7320_3.1

cisco cache engine 550 2.4.0

cisco cache engine 570 2.2.0

cisco enterprise content delivery network software 4.0

cisco content distribution manager 4630

cisco content distribution manager 4630 4.0

cisco content distribution manager 4630 4.1

cisco content distribution manager 4650

cisco content engine 590

cisco content engine 590_2.2.0

cisco content engine 590_3.1

cisco content engine 590_4.0

cisco cache engine 570 2.4.0

cisco cache engine 570 3.0

cisco cache engine 570 570

cisco content router 4430

cisco content distribution manager 4650 4.0

cisco content engine 507

cisco content engine 560_3.1

cisco content engine 560_4.1

cisco content engine 590_4.1

cisco content engine 7320_2.2.0

cisco cache engine 550 2.2.0

cisco cache engine 550 3.0

cisco enterprise content delivery network software 4.1

Vendor Advisories

Cisco Cache Engines and Content Engines provide a transparent cache for world wide web pages retrieved via HTTP These products also can be configured to transparently intercept requests to proxy servers supporting various protocols such as HTTPS The default configuration of the proxy feature can be abused to open a TCP connection to any r ...