ID

VAR-201609-0590


CVE

CVE-2014-2146


TITLE

Cisco IOS and IOS XE Vulnerability in the zone-based firewall function that prevents access to resources

Trust: 0.8

sources: JVNDB: JVNDB-2014-008181

DESCRIPTION

The Zone-Based Firewall (ZBFW) functionality in Cisco IOS, possibly 15.4 and earlier, and IOS XE, possibly 3.13 and earlier, mishandles zone checking for existing sessions, which allows remote attackers to bypass intended resource-access restrictions via spoofed traffic that matches one of these sessions, aka Bug IDs CSCun94946 and CSCun96847. Vendors have confirmed this vulnerability Bug ID CSCun94946 ,and CSCun96847 It is released as.A third party may be able to circumvent restricted access to resources through forged traffic that matches the session. Both Cisco IOS and IOSXESoftware are operating systems developed by Cisco for its network devices. Zone-BasedFirewall (ZBFW) is one of the policy firewall components. The ZBFW feature in Cisco IOS and IOSXESoftware has a security bypass vulnerability that stems from a program failing to properly check the current session's data flow. This vulnerability can be exploited by remote attackers to inject and pass fake data streams, bypassing security restrictions and gaining unauthorized access to resources. This may aid in further attacks. This issue is tracked by Cisco Bug IDs CSCun94946 and CSCun96847

Trust: 2.52

sources: NVD: CVE-2014-2146 // JVNDB: JVNDB-2014-008181 // CNVD: CNVD-2016-08194 // BID: 93126 // VULHUB: VHN-70085

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-08194

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:lteversion:15.4\(1\)t1

Trust: 1.0

vendor:ciscomodel:ios xescope:lteversion:15.4\(3\)s

Trust: 1.0

vendor:ciscomodel:iosscope:lteversion:15.4

Trust: 0.8

vendor:ciscomodel:ios xescope:lteversion:3.13

Trust: 0.8

vendor:ciscomodel:iosscope:lteversion:<=15.4

Trust: 0.6

vendor:ciscomodel:ios xescope:lteversion:<=3.13

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:15.4\(3\)s

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.4\(1\)t1

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios softwarescope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2016-08194 // BID: 93126 // JVNDB: JVNDB-2014-008181 // CNNVD: CNNVD-201609-558 // NVD: CVE-2014-2146

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2146
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-2146
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-08194
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201609-558
value: MEDIUM

Trust: 0.6

VULHUB: VHN-70085
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-2146
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-08194
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-70085
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2014-2146
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-08194 // VULHUB: VHN-70085 // JVNDB: JVNDB-2014-008181 // CNNVD: CNNVD-201609-558 // NVD: CVE-2014-2146

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-70085 // JVNDB: JVNDB-2014-008181 // NVD: CVE-2014-2146

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201609-558

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201609-558

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-008181

PATCH

title:CSCun94946 - IOS : Vulnerability in Zone Based Firewallurl:https://quickview.cloudapps.cisco.com/quickview/bug/CSCun94946

Trust: 0.8

title:CSCun96847 - IOS-XE : Zone mismatch vulnerability in Zone Based Firewallurl:https://quickview.cloudapps.cisco.com/quickview/bug/CSCun96847

Trust: 0.8

title:39129url:https://tools.cisco.com/security/center/viewAlert.x?alertId=39129

Trust: 0.8

title:Cisco IOS and IOSXESoftwareZBFW Functional Security Bypass Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/81788

Trust: 0.6

title:Cisco IOS and IOS XE Software Repair measures for security bypass vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64287

Trust: 0.6

sources: CNVD: CNVD-2016-08194 // JVNDB: JVNDB-2014-008181 // CNNVD: CNNVD-201609-558

EXTERNAL IDS

db:NVDid:CVE-2014-2146

Trust: 3.4

db:BIDid:93126

Trust: 1.4

db:JVNDBid:JVNDB-2014-008181

Trust: 0.8

db:CNNVDid:CNNVD-201609-558

Trust: 0.7

db:CNVDid:CNVD-2016-08194

Trust: 0.6

db:VULHUBid:VHN-70085

Trust: 0.1

sources: CNVD: CNVD-2016-08194 // VULHUB: VHN-70085 // BID: 93126 // JVNDB: JVNDB-2014-008181 // CNNVD: CNNVD-201609-558 // NVD: CVE-2014-2146

REFERENCES

url:https://tools.cisco.com/security/center/viewalert.x?alertid=39129

Trust: 2.0

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2146

Trust: 1.4

url:http://www.securityfocus.com/bid/93126

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2146

Trust: 0.8

url:http://www.cisco.com

Trust: 0.3

sources: CNVD: CNVD-2016-08194 // VULHUB: VHN-70085 // BID: 93126 // JVNDB: JVNDB-2014-008181 // CNNVD: CNNVD-201609-558 // NVD: CVE-2014-2146

CREDITS

Cisco

Trust: 0.3

sources: BID: 93126

SOURCES

db:CNVDid:CNVD-2016-08194
db:VULHUBid:VHN-70085
db:BIDid:93126
db:JVNDBid:JVNDB-2014-008181
db:CNNVDid:CNNVD-201609-558
db:NVDid:CVE-2014-2146

LAST UPDATE DATE

2024-11-23T22:49:13.957000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-08194date:2016-09-27T00:00:00
db:VULHUBid:VHN-70085date:2017-02-19T00:00:00
db:BIDid:93126date:2016-09-23T10:21:00
db:JVNDBid:JVNDB-2014-008181date:2016-09-28T00:00:00
db:CNNVDid:CNNVD-201609-558date:2016-09-23T00:00:00
db:NVDid:CVE-2014-2146date:2024-11-21T02:05:44.440

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-08194date:2016-09-27T00:00:00
db:VULHUBid:VHN-70085date:2016-09-22T00:00:00
db:BIDid:93126date:2015-05-29T00:00:00
db:JVNDBid:JVNDB-2014-008181date:2016-09-28T00:00:00
db:CNNVDid:CNNVD-201609-558date:2016-09-23T00:00:00
db:NVDid:CVE-2014-2146date:2016-09-22T17:59:00.133