Cisco ASR901 prior 15.4(2.17)S0.5/15.4(3)S/15.5(0.2)S IPv4 Packet resource management

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.6 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Cisco ASR901. It has been declared as problematic. The affected element is an unknown function of the component IPv4 Packet Handler. Executing a manipulation can lead to resource management. The identification of this vulnerability is CVE-2014-3293. There is no exploit available. It is recommended to upgrade the affected component.
Details
A vulnerability was found in Cisco ASR901 (Router Operating System). It has been declared as problematic. This vulnerability affects some unknown processing of the component IPv4 Packet Handler. The manipulation with an unknown input leads to a resource management vulnerability. The CWE definition for the vulnerability is CWE-399. As an impact it is known to affect availability. CVE summarizes:
Cisco IOS 15.4(3)S0b on ASR901 devices makes incorrect decisions to use the CPU for IPv4 packet processing, which allows remote attackers to cause a denial of service (BGP neighbor flapping) by sending many crafted IPv4 packets, aka Bug ID CSCuo29736.
The weakness was shared 10/27/2014 with Cisco as CSCuo29736 as confirmed security notice (Website). The advisory is available at tools.cisco.com. This vulnerability was named CVE-2014-3293 since 05/07/2014. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available.
Upgrading to version 15.4(2.17)S0.5, 15.4(3)S or 15.5(0.2)S eliminates this vulnerability. A possible mitigation has been published 1 days after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (97769), SecurityFocus (BID 70744†), Secunia (SA61830†), SecurityTracker (ID 1031122†) and Vulnerability Center (SBV-46819†). Additional details are provided at tools.cisco.com. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.6
VulDB Base Score: 5.3
VulDB Temp Score: 4.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: ASR901 15.4(2.17)S0.5/15.4(3)S/15.5(0.2)S
Timeline
05/07/2014 🔍10/27/2014 🔍
10/27/2014 🔍
10/28/2014 🔍
10/28/2014 🔍
10/28/2014 🔍
10/28/2014 🔍
10/28/2014 🔍
10/29/2014 🔍
10/29/2014 🔍
06/10/2017 🔍
Sources
Vendor: cisco.comAdvisory: CSCuo29736
Organization: Cisco
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-3293 (🔍)
GCVE (CVE): GCVE-0-2014-3293
GCVE (VulDB): GCVE-100-68074
X-Force: 97769 - Cisco ASR901 IPv4 denial of service, Medium Risk
SecurityFocus: 70744 - Cisco ASR 901 Series Routers CVE-2014-3293 Denial of Service Vulnerability
Secunia: 61830 - Cisco ASR 901 IPv4 Packet Handling Denial of Service Vulnerability, Less Critical
SecurityTracker: 1031122 - Cisco ASR 901 Series Aggregation Router IPv4 Processing Flaw Lets Remote Users Deny Service
Vulnerability Center: 46819 - Cisco IOS 15.4(3)S on ASR901 devices Remote DoS via Crafted IPv4 Packets, Medium
Misc.: 🔍
Entry
Created: 10/28/2014 15:12Updated: 06/10/2017 09:46
Changes: 10/28/2014 15:12 (76), 06/10/2017 09:46 (3)
Complete: 🔍
Cache ID: 216:5A1:103
No comments yet. Languages: en.
Please log in to comment.