[原文]The transparent proxy feature of the Cisco Application Velocity System (AVS) 3110 5.0 and 4.0 and earlier, and 3120 5.0.0 and earlier, has a default configuration that allows remote attackers to proxy arbitrary TCP connections, aka Bug ID CSCsd32143.
[CNNVD]Cisco Application Velocity System Open TCP 代理服务器功能 默认配置 输入验证漏洞(CNNVD-200605-223)
Cisco Application Velocity System (AVS) 3110 5.0 和 4.0及之前版本，以及3120 5.0.0及之前版本的代理服务器功能具有默认配置，该配置可以使远程攻击者代理任意TCP连接，又称Bug ID CSCsd32143。
Cisco Application Velocity System (AVS) Transparent Proxy Arbitrary Mail Relay
Remote / Network Access
Loss of Integrity
Cisco Application Velocity System contains a flaw that may allow a malicious user to establish arbitrary TCP connection. The issue is triggered when an unspecified action occurs. It is possible that the flaw may allow malicious users to circumvent network policy. One likely reason to abuse this flaw is to connect to arbitrary mail servers.
Upgrade to version 5.0.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.