CVE-2014-3327
Published Aug 11, 2014
Last updated 7 years ago
Overview
- Description
- The EnergyWise module in Cisco IOS 12.2, 15.0, 15.1, 15.2, and 15.4 and IOS XE 3.2.xXO, 3.3.xSG, 3.4.xSG, and 3.5.xE before 3.5.3E allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 packet, aka Bug ID CSCup52101.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178" }, { "criteria": "cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF87CC9A-1AF5-4DB4-ACE5-DB938D3B2F84" }, { "criteria": "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB41294E-F3DF-4F1E-A4C8-E90B21A88836" }, { "criteria": "cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2AB6A02-B7C7-48D1-8857-BD1CDF9A40D8" }, { "criteria": "cpe:2.3:o:cisco:ios:15.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D549F66-13E6-4AB0-972D-6F7FE6DB82DB" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.00.xo.15.0\\(2\\)xo:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7F018C7-4BC5-443E-815E-481C805F3612" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6256C79-DBDA-4ED7-AA3B-DE78B8C387B3" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5" } ], "operator": "OR" } ] } ]