ID

VAR-201410-0057


CVE

CVE-2014-3396


TITLE

plural ASR 9000 Run on device Cisco IOS XR In Typhoon Line card ACL Vulnerabilities that can be bypassed

Trust: 0.8

sources: JVNDB: JVNDB-2014-004526

DESCRIPTION

Cisco IOS XR on ASR 9000 devices does not properly use compression for port-range and address-range encoding, which allows remote attackers to bypass intended Typhoon line-card ACL restrictions via transit traffic, aka Bug ID CSCup30133. Vendors have confirmed this vulnerability Bug ID CSCup30133 It is released as.By a third party via transit traffic, Typhoon Line card ACL You may be able to work around the limitation. Cisco IOS XR is a fully modular, distributed network operating system from Cisco's IOS software family. An attacker can exploit this issue to bypass the access list and perform unauthorized actions. This issue is being tracked by Cisco Bug ID CSCup30133. The vulnerability is caused by the incorrect compression of port-range and address-range encoding. A remote attacker can exploit this vulnerability to bypass the established Typhoon line-card ACL restrictions by means of relay communication

Trust: 2.52

sources: NVD: CVE-2014-3396 // JVNDB: JVNDB-2014-004526 // CNVD: CNVD-2014-06555 // BID: 70236 // VULHUB: VHN-71336

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-06555

AFFECTED PRODUCTS

vendor:ciscomodel:ios xrscope: - version: -

Trust: 1.4

vendor:ciscomodel:asr 9000 rsp440 routerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 9001scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 9912scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 9922scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 9006scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 9904scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ios xrscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:asr 9010scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:asr 9000 series rsp440scope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9001 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9006 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9010 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9904 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9912 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:asr 9922 routerscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xr softwarescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2014-06555 // JVNDB: JVNDB-2014-004526 // CNNVD: CNNVD-201410-109 // NVD: CVE-2014-3396

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3396
value: HIGH

Trust: 1.0

NVD: CVE-2014-3396
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-06555
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201410-109
value: HIGH

Trust: 0.6

VULHUB: VHN-71336
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-3396
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-06555
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-71336
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-06555 // VULHUB: VHN-71336 // JVNDB: JVNDB-2014-004526 // CNNVD: CNNVD-201410-109 // NVD: CVE-2014-3396

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-71336 // JVNDB: JVNDB-2014-004526 // NVD: CVE-2014-3396

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201410-109

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201410-109

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004526

PATCH

title:Cisco IOS XR Software Compression ACL Bypass Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3396

Trust: 0.8

title:35944url:http://tools.cisco.com/security/center/viewAlert.x?alertId=35944

Trust: 0.8

title:Cisco IOS XR Software Security Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/50629

Trust: 0.6

sources: CNVD: CNVD-2014-06555 // JVNDB: JVNDB-2014-004526

EXTERNAL IDS

db:NVDid:CVE-2014-3396

Trust: 3.4

db:BIDid:70236

Trust: 1.0

db:JVNDBid:JVNDB-2014-004526

Trust: 0.8

db:CNNVDid:CNNVD-201410-109

Trust: 0.7

db:CNVDid:CNVD-2014-06555

Trust: 0.6

db:VULHUBid:VHN-71336

Trust: 0.1

sources: CNVD: CNVD-2014-06555 // VULHUB: VHN-71336 // BID: 70236 // JVNDB: JVNDB-2014-004526 // CNNVD: CNNVD-201410-109 // NVD: CVE-2014-3396

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3396

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3396

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3396

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2014-06555 // VULHUB: VHN-71336 // BID: 70236 // JVNDB: JVNDB-2014-004526 // CNNVD: CNNVD-201410-109 // NVD: CVE-2014-3396

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 70236

SOURCES

db:CNVDid:CNVD-2014-06555
db:VULHUBid:VHN-71336
db:BIDid:70236
db:JVNDBid:JVNDB-2014-004526
db:CNNVDid:CNNVD-201410-109
db:NVDid:CVE-2014-3396

LAST UPDATE DATE

2024-11-23T22:49:26.079000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-06555date:2014-10-09T00:00:00
db:VULHUBid:VHN-71336date:2014-10-06T00:00:00
db:BIDid:70236date:2014-10-03T00:00:00
db:JVNDBid:JVNDB-2014-004526date:2014-10-07T00:00:00
db:CNNVDid:CNNVD-201410-109date:2014-10-10T00:00:00
db:NVDid:CVE-2014-3396date:2024-11-21T02:08:00.510

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-06555date:2014-10-09T00:00:00
db:VULHUBid:VHN-71336date:2014-10-05T00:00:00
db:BIDid:70236date:2014-10-03T00:00:00
db:JVNDBid:JVNDB-2014-004526date:2014-10-07T00:00:00
db:CNNVDid:CNNVD-201410-109date:2014-10-10T00:00:00
db:NVDid:CVE-2014-3396date:2014-10-05T01:55:13.110