CVE-2014-3385
Published Oct 10, 2014
Last updated 10 years ago
Overview
- Description
- Race condition in the Health and Performance Monitoring (HPM) for ASDM feature in Cisco ASA Software 8.3 before 8.3(2.42), 8.4 before 8.4(7.11), 8.5 before 8.5(1.19), 8.6 before 8.6(1.13), 8.7 before 8.7(1.11), 9.0 before 9.0(4.8), and 9.1 before 9.1(4.5) allows remote attackers to cause a denial of service (device reload) via TCP traffic that triggers many half-open connections at the same time, aka Bug ID CSCum00556.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-362
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:asa:8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F6CBA34-0D66-4424-89F8-BD40930B7480" }, { "criteria": "cpe:2.3:a:cisco:asa:8.3.2.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6FB469C-8612-4FAF-9A00-ED2C54E1B30B" }, { "criteria": "cpe:2.3:a:cisco:asa:8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44402EC4-8170-4CEA-9AC1-1F4C8B0D411D" }, { "criteria": "cpe:2.3:a:cisco:asa:8.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42D7DD30-2639-4F42-BD15-AB2A3A03E0B7" }, { "criteria": "cpe:2.3:a:cisco:asa:8.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9D20B32-C543-424D-8276-ED0DE1DC55AC" }, { "criteria": "cpe:2.3:a:cisco:asa:8.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06A9CD2B-BD9B-4728-9CD4-7CB5A082BA61" }, { "criteria": "cpe:2.3:a:cisco:asa:8.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E98B331A-368F-4F68-81FA-BDE0260FEE9B" }, { "criteria": "cpe:2.3:a:cisco:asa:8.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3B559FF-9C48-4F87-A792-FF391CA37BDF" }, { "criteria": "cpe:2.3:a:cisco:asa:8.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E24D3F15-3789-4EAB-87C7-3FA5EA676510" }, { "criteria": "cpe:2.3:a:cisco:asa:8.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC873F47-93A7-4889-96F9-157F977968D5" }, { "criteria": "cpe:2.3:a:cisco:asa:8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58A5FE47-8673-4D43-B749-07BA4BFA8429" }, { "criteria": "cpe:2.3:a:cisco:asa:8.5.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FBD454F-8235-4FE9-92BF-9071DE326FF6" }, { "criteria": "cpe:2.3:a:cisco:asa:8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51525D78-0238-4379-A577-EAB6D278F0BC" }, { "criteria": "cpe:2.3:a:cisco:asa:8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72799BBB-B2BE-4F75-B5F1-91AB3517B405" }, { "criteria": "cpe:2.3:a:cisco:asa:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD97CD57-66F4-4A92-8897-A96D9E93116A" }, { "criteria": "cpe:2.3:a:cisco:asa:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "790D2962-AE6A-4001-9793-A9B1C8916D3F" } ], "operator": "OR" } ] } ]