Cisco IOS 15.1(4)M3 on 1800 ISDN Basic Rate Interface resource management

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.4 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic has been found in Cisco IOS 15.1(4)M3 on 1800. This issue affects some unknown processing of the component ISDN Basic Rate Interface. This manipulation causes resource management. This vulnerability appears as CVE-2014-3347. There is no available exploit. It is recommended to replace the affected component with an alternative.
Details
A vulnerability has been found in Cisco IOS 15.1(4)M3 on 1800 (Router Operating System) and classified as problematic. Affected by this vulnerability is some unknown processing of the component ISDN Basic Rate Interface. The manipulation with an unknown input leads to a resource management vulnerability. The CWE definition for the vulnerability is CWE-399. As an impact it is known to affect availability.
The weakness was presented 08/27/2014 with Cisco as CSCul77897 as confirmed security notice (Website). It is possible to read the advisory at tools.cisco.com. This vulnerability is known as CVE-2014-3347 since 05/07/2014. The exploitation appears to be difficult. The attack can be launched remotely. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 02/11/2022). The advisory points out:
Cisco 1800 Series Integrated Services Routers (ISR) contain a vulnerability in the hardware entropy collection module when the Integrated Services Digital Network (ISDN) Basic Rate Interface (BRI) is configured and connected to a public switched network. This could allow an attacker with knowledge of the ISDN phone number of the affected device to trigger a denial of service (DoS) condition. The vulnerability is due to an interrupt timer collision that causes the hardware encryption module to enter a corrupted state, causing the device to become unresponsive. An attacker would need to perform the attack exactly when the device polls the hardware encryption module to perform entropy collection.
The problem might be mitigated by replacing the product with as an alternative. The security notice contains the following remark:
The affected devices have reached the End of Software Maintenance milestone. Fixed software will not be released.
The vulnerability is also documented in the databases at X-Force (95558), SecurityFocus (BID 69439†), SecurityTracker (ID 1030772†) and Vulnerability Center (SBV-45957†). Additional details are provided at tools.cisco.com. Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.4
VulDB Base Score: 5.9
VulDB Temp Score: 5.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: AlternativeStatus: 🔍
0-Day Time: 🔍
Timeline
05/07/2014 🔍08/27/2014 🔍
08/27/2014 🔍
08/27/2014 🔍
08/28/2014 🔍
08/28/2014 🔍
08/28/2014 🔍
08/29/2014 🔍
02/11/2022 🔍
Sources
Vendor: cisco.comAdvisory: CSCul77897
Organization: Cisco
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-3347 (🔍)
GCVE (CVE): GCVE-0-2014-3347
GCVE (VulDB): GCVE-100-67423
X-Force: 95558 - Cisco 1800 Series Integrated Services Routers collection module denial of service, Medium Risk
SecurityFocus: 69439 - Cisco 1800 Series CVE-2014-3347 Denial of Service Vulnerability
SecurityTracker: 1030772 - Cisco 1800 Series Integrated Services Router ISDN Timing Error Lets Remote Users Deny Services
Vulnerability Center: 45957 - Cisco IOS 15.1(4)M2 on 1800 Series ISR Remote DoS via ISDN Phone Number, Medium
Misc.: 🔍
Entry
Created: 08/29/2014 10:11Updated: 02/11/2022 07:29
Changes: 08/29/2014 10:11 (74), 06/05/2017 10:41 (1), 02/11/2022 07:29 (3)
Complete: 🔍
Cache ID: 216:6FD:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.