ID

VAR-201403-0477


CVE

CVE-2014-2108


TITLE

Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-001827

DESCRIPTION

Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.2 through 3.7 before 3.7.5S and 3.8 through 3.10 before 3.10.1S allow remote attackers to cause a denial of service (device reload) via a malformed IKEv2 packet, aka Bug ID CSCui88426. Vendors have confirmed this vulnerability Bug ID CSCui88426 It is released as.Malformed by a third party IKEv2 Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A remote attacker exploits this vulnerability to create a denial of service (memory exhaustion) through a specially crafted IKEv2 packet. An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCui88426

Trust: 2.52

sources: NVD: CVE-2014-2108 // JVNDB: JVNDB-2014-001827 // CNVD: CNVD-2014-02022 // BID: 66471 // VULHUB: VHN-70047

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-02022

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 2.4

vendor:ciscomodel:ios xe 3.4sscope: - version: -

Trust: 2.1

vendor:ciscomodel:ios xescope:eqversion:3.4.4s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.5s\(.1\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.0as

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.3s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.5s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.2s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.5s\(.2\)

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.xs

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.0s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.xs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.2sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.3sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.1sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0\(1\)se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s\(.5\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.1sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.4sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s\(.4\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0sg

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s\(.2\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s\(.3\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6s\(.1\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8s\(.0\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.0sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s\(.6\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.0xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4s\(.0\)

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.0s

Trust: 1.0

vendor:ciscomodel:ios xe 3.8sscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios xe 3.6sscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios xe 3.3sscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios xe 3.2sscope: - version: -

Trust: 0.9

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.3

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.2 to 3.10

Trust: 0.8

vendor:ciscomodel:ios xe 3.7sscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe 3.5sscope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.9.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.8.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.6.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:3.5

Trust: 0.3

vendor:ciscomodel:ios xe 3.4.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.3.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.2.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios xe 3.10s.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 3.4.xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 3.3.xsgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sniscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1xoscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1syscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sniscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sngscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0sescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0ehscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0edscope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

sources: CNVD: CNVD-2014-02022 // BID: 66471 // JVNDB: JVNDB-2014-001827 // CNNVD: CNNVD-201403-508 // NVD: CVE-2014-2108

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2108
value: HIGH

Trust: 1.0

NVD: CVE-2014-2108
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-02022
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201403-508
value: HIGH

Trust: 0.6

VULHUB: VHN-70047
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-2108
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-02022
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-70047
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-02022 // VULHUB: VHN-70047 // JVNDB: JVNDB-2014-001827 // CNNVD: CNNVD-201403-508 // NVD: CVE-2014-2108

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-70047 // JVNDB: JVNDB-2014-001827 // NVD: CVE-2014-2108

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201403-508

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201403-508

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001827

PATCH

title:cisco-sa-20140326-ikev2url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2

Trust: 0.8

title:33346url:http://tools.cisco.com/security/center/viewAlert.x?alertId=33346

Trust: 0.8

title:cisco-sa-20140326-ikev2url:http://www.cisco.com/cisco/web/support/JP/112/1122/1122242_cisco-sa-20140326-ikev2-j.html

Trust: 0.8

title:Patch for Cisco IOS Software IK3v2 Module Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/44561

Trust: 0.6

sources: CNVD: CNVD-2014-02022 // JVNDB: JVNDB-2014-001827

EXTERNAL IDS

db:NVDid:CVE-2014-2108

Trust: 3.4

db:BIDid:66471

Trust: 1.0

db:JVNDBid:JVNDB-2014-001827

Trust: 0.8

db:CNNVDid:CNNVD-201403-508

Trust: 0.7

db:CNVDid:CNVD-2014-02022

Trust: 0.6

db:CISCOid:20140326 CISCO IOS SOFTWARE INTERNET KEY EXCHANGE VERSION 2 DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:SECUNIAid:57631

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.3

db:VULHUBid:VHN-70047

Trust: 0.1

sources: CNVD: CNVD-2014-02022 // VULHUB: VHN-70047 // BID: 66471 // JVNDB: JVNDB-2014-001827 // CNNVD: CNNVD-201403-508 // NVD: CVE-2014-2108

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140326-ikev2

Trust: 2.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2108

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2108

Trust: 0.8

url:http://secunia.com/advisories/57631

Trust: 0.6

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=33346

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.3

sources: CNVD: CNVD-2014-02022 // VULHUB: VHN-70047 // BID: 66471 // JVNDB: JVNDB-2014-001827 // CNNVD: CNNVD-201403-508 // NVD: CVE-2014-2108

CREDITS

Cisco

Trust: 0.3

sources: BID: 66471

SOURCES

db:CNVDid:CNVD-2014-02022
db:VULHUBid:VHN-70047
db:BIDid:66471
db:JVNDBid:JVNDB-2014-001827
db:CNNVDid:CNNVD-201403-508
db:NVDid:CVE-2014-2108

LAST UPDATE DATE

2024-11-23T20:11:18.571000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-02022date:2014-03-31T00:00:00
db:VULHUBid:VHN-70047date:2014-03-28T00:00:00
db:BIDid:66471date:2017-05-23T16:24:00
db:JVNDBid:JVNDB-2014-001827date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-508date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2108date:2024-11-21T02:05:40.100

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-02022date:2014-03-31T00:00:00
db:VULHUBid:VHN-70047date:2014-03-27T00:00:00
db:BIDid:66471date:2014-03-26T00:00:00
db:JVNDBid:JVNDB-2014-001827date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-508date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2108date:2014-03-27T21:55:09.003