CVE-2014-2103
Published Feb 27, 2014
Last updated 11 years ago
Overview
- Description
- Cisco Intrusion Prevention System (IPS) Software allows remote attackers to cause a denial of service (MainApp process outage) via malformed SNMP packets, aka Bug IDs CSCum52355 and CSCul49309.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D846D9B7-CB24-40C6-B7A4-2ABFF0D43442" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B010D14A-7275-454B-B2F8-31EE0D34C24F" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:6.0.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5853BC19-384F-423B-B376-D001B8AA099C" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03105E7F-12F8-4497-8A27-BD2F1653FD38" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(1\\)e3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32F57CD3-EA32-4814-A021-3CEB23900E18" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(2\\)e3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDCEF522-431E-49D3-84F8-24EBE0D03E0B" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(2\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5961030A-ADD4-4BA6-A691-275DE6D9E1B2" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(3\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21F422BC-E40B-4EC6-B0A5-7CD3A3C92B4A" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(4\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04BA1FCB-DF1B-42E5-BBF3-808119AF80ED" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(5a\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6074CC8-4A49-4A31-809F-B87E4B80D179" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(6\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20548D0B-8B3C-468F-8966-13019C4D69C6" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(7\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3206DA6-FE23-4214-A1F8-3C212C2768BB" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(8\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C07BDE6-25D7-49D5-AEAD-6BE3D1F5F171" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.0\\(9\\)e4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5887C44-EEA8-4AB8-9136-790D1E8C8B45" }, { "criteria": "cpe:2.3:a:cisco:intrusion_prevention_system:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F03BDC3C-E7F1-41C1-B89C-1DB1D3997DC2" }, { "criteria": "cpe:2.3:h:cisco:intrusion_prevention_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7D9E05D-DF28-4BC3-A54E-9F0682197939" } ], "operator": "OR" } ] } ]