If you used Cisco router as border or vpn concentrator (that is somebody has access to it from Internet), you would update software near time. Remote attacker could exploit this vulnerability by attempting a reverse SSH login with a crafted username
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-ssh