ID

VAR-201406-0307


CVE

CVE-2014-3290


TITLE

Cisco IOS XE of mDNS Vulnerability in obtaining important network service information in the implementation of

Trust: 0.8

sources: JVNDB: JVNDB-2014-002938

DESCRIPTION

The mDNS implementation in Cisco IOS XE 3.12S does not properly interact with autonomic networking, which allows remote attackers to obtain sensitive networking-services information by sniffing the network or overwrite networking-services data via a crafted mDNS response, aka Bug ID CSCun64867. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco Autonomic Networking infrastructure is prone to a security-bypass vulnerability. An attacker can leverage this issue to perform unauthorized actions and obtain sensitive information that may aid in further attacks. This issue is being tracked by Cisco Bug ID CSCun64867. The vulnerability stems from the fact that the program does not properly restrict mDNS from handling autonomous networks

Trust: 2.52

sources: NVD: CVE-2014-3290 // JVNDB: JVNDB-2014-002938 // CNVD: CNVD-2014-03695 // BID: 68021 // VULHUB: VHN-71230

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-03695

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.12s

Trust: 2.4

vendor:ciscomodel:ios xe 3.12sscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2014-03695 // JVNDB: JVNDB-2014-002938 // CNNVD: CNNVD-201406-319 // NVD: CVE-2014-3290

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3290
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-3290
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-03695
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201406-319
value: MEDIUM

Trust: 0.6

VULHUB: VHN-71230
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-3290
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-03695
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-71230
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-03695 // VULHUB: VHN-71230 // JVNDB: JVNDB-2014-002938 // CNNVD: CNNVD-201406-319 // NVD: CVE-2014-3290

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-71230 // JVNDB: JVNDB-2014-002938 // NVD: CVE-2014-3290

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201406-319

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201406-319

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002938

PATCH

title:Cisco Autonomic Networking Infrastructure Overwrite Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3290

Trust: 0.8

title:34613url:http://tools.cisco.com/security/center/viewAlert.x?alertId=34613

Trust: 0.8

title:Cisco Autonomic Networking Infrastructure Security Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/46450

Trust: 0.6

sources: CNVD: CNVD-2014-03695 // JVNDB: JVNDB-2014-002938

EXTERNAL IDS

db:NVDid:CVE-2014-3290

Trust: 3.4

db:BIDid:68021

Trust: 2.0

db:SECUNIAid:58715

Trust: 1.1

db:SECTRACKid:1030444

Trust: 1.1

db:JVNDBid:JVNDB-2014-002938

Trust: 0.8

db:CNNVDid:CNNVD-201406-319

Trust: 0.7

db:CNVDid:CNVD-2014-03695

Trust: 0.6

db:VULHUBid:VHN-71230

Trust: 0.1

sources: CNVD: CNVD-2014-03695 // VULHUB: VHN-71230 // BID: 68021 // JVNDB: JVNDB-2014-002938 // CNNVD: CNNVD-201406-319 // NVD: CVE-2014-3290

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3290

Trust: 1.7

url:http://tools.cisco.com/security/center/viewalert.x?alertid=34613

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3290

Trust: 1.4

url:http://www.securityfocus.com/bid/68021

Trust: 1.1

url:http://www.securitytracker.com/id/1030444

Trust: 1.1

url:http://secunia.com/advisories/58715

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3290

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2014-03695 // VULHUB: VHN-71230 // BID: 68021 // JVNDB: JVNDB-2014-002938 // CNNVD: CNNVD-201406-319 // NVD: CVE-2014-3290

CREDITS

Cisco

Trust: 0.3

sources: BID: 68021

SOURCES

db:CNVDid:CNVD-2014-03695
db:VULHUBid:VHN-71230
db:BIDid:68021
db:JVNDBid:JVNDB-2014-002938
db:CNNVDid:CNNVD-201406-319
db:NVDid:CVE-2014-3290

LAST UPDATE DATE

2024-11-23T23:02:48.634000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-03695date:2014-06-17T00:00:00
db:VULHUBid:VHN-71230date:2016-09-06T00:00:00
db:BIDid:68021date:2014-06-12T00:00:00
db:JVNDBid:JVNDB-2014-002938date:2014-06-17T00:00:00
db:CNNVDid:CNNVD-201406-319date:2014-06-16T00:00:00
db:NVDid:CVE-2014-3290date:2024-11-21T02:07:48.073

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-03695date:2014-06-17T00:00:00
db:VULHUBid:VHN-71230date:2014-06-14T00:00:00
db:BIDid:68021date:2014-06-12T00:00:00
db:JVNDBid:JVNDB-2014-002938date:2014-06-17T00:00:00
db:CNNVDid:CNNVD-201406-319date:2014-06-16T00:00:00
db:NVDid:CVE-2014-3290date:2014-06-14T11:18:55.190