Cisco IOS XR 5.2.0.BASE on ASR 9000 DHCPv6 Packet input validation

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Cisco IOS XR 5.2.0.BASE on ASR 9000. It has been rated as problematic. The impacted element is an unknown function of the component DHCPv6 Packet Handler. This manipulation causes input validation. The identification of this vulnerability is CVE-2014-3343. There is no exploit available. Upgrading the affected component is advised.
Details
A vulnerability has been found in Cisco IOS XR 5.2.0.BASE on ASR 9000 (Router Operating System) and classified as problematic. Affected by this vulnerability is an unknown function of the component DHCPv6 Packet Handler. The manipulation with an unknown input leads to a input validation vulnerability. The CWE definition for the vulnerability is CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. As an impact it is known to affect availability. The summary by CVE is:
Cisco IOS XR 5.1 allows remote attackers to cause a denial of service (DHCPv6 daemon crash) via a malformed DHCPv6 packet, aka Bug ID CSCuo59052.
The weakness was shared 09/08/2014 with Cisco as CSCuo59052 as confirmed security notice (Website). It is possible to read the advisory at tools.cisco.com. This vulnerability is known as CVE-2014-3343 since 05/07/2014. The attack can be launched remotely. The exploitation doesn't need any form of authentication. The technical details are unknown and an exploit is not publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 79577 , which helps to determine the existence of the flaw in a target environment. It is .
Upgrading to version 5.2.2.17i.FWDG or 5.3.0.1i.FWDG eliminates this vulnerability. The upgrade is hosted for download at software.cisco.com. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (95781), Tenable (79577), SecurityFocus (BID 69667†), Secunia (SA60122†) and SecurityTracker (ID 1030816†). Additional details are provided at tools.cisco.com. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 79577
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Port: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: IOS XR 5.2.2.17i.FWDG/5.3.0.1i.FWDG
Timeline
05/07/2014 🔍09/08/2014 🔍
09/08/2014 🔍
09/08/2014 🔍
09/08/2014 🔍
09/09/2014 🔍
09/09/2014 🔍
09/10/2014 🔍
09/10/2014 🔍
11/26/2014 🔍
12/03/2014 🔍
02/15/2022 🔍
Sources
Vendor: cisco.comAdvisory: CSCuo59052
Organization: Cisco
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-3343 (🔍)
GCVE (CVE): GCVE-0-2014-3343
GCVE (VulDB): GCVE-100-67459
X-Force: 95781 - Cisco IOS XR DHCPv6 denial of service, Medium Risk
SecurityFocus: 69667 - Cisco IOS XR Software DHCPv6 Packet Handling CVE-2014-3343 Denial of Service Vulnerability
Secunia: 60122 - Cisco IOS XR Software DHCPv6 Packet Handling Denial of Service Vulnerability, Not Critical
SecurityTracker: 1030816 - Cisco IOS XR DHCPv6 Processing Flaw Lets Remote Users Deny Service
Vulnerability Center: 47402 - Cisco IOS XR 5.1 Remote DoS via a Malformed DHCPv6 Packet, Medium
scip Labs: https://www.scip.ch/en/?labs.20150108
Misc.: 🔍
Entry
Created: 09/09/2014 15:41Updated: 02/15/2022 09:51
Changes: 09/09/2014 15:41 (78), 06/13/2017 08:49 (6), 02/15/2022 09:51 (3)
Complete: 🔍
Cache ID: 216::103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.