ID

VAR-201403-0478


CVE

CVE-2014-2109


TITLE

Cisco IOS of TCP Input Denial of service in module (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2014-001828

DESCRIPTION

The TCP Input module in Cisco IOS 12.2 through 12.4 and 15.0 through 15.4, when NAT is used, allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted TCP packets, aka Bug IDs CSCuh33843 and CSCuj41494. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. This issue is being tracked by Cisco Bug ID CSCue00996, CSCuh33843 and CSCuj41494

Trust: 2.61

sources: NVD: CVE-2014-2109 // JVNDB: JVNDB-2014-001828 // CNVD: CNVD-2014-01994 // BID: 66470 // VULHUB: VHN-70048 // VULMON: CVE-2014-2109

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-01994

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.4

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2 to 12.4

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.4

Trust: 0.8

vendor:ciscomodel:ios softwarescope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios 15.4sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sngscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zyascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xndscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xncscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2segscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sccscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2iriscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ircscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2exscope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

sources: CNVD: CNVD-2014-01994 // BID: 66470 // JVNDB: JVNDB-2014-001828 // CNNVD: CNNVD-201403-509 // NVD: CVE-2014-2109

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2109
value: HIGH

Trust: 1.0

NVD: CVE-2014-2109
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-01994
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201403-509
value: HIGH

Trust: 0.6

VULHUB: VHN-70048
value: HIGH

Trust: 0.1

VULMON: CVE-2014-2109
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-2109
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2014-01994
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-70048
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-01994 // VULHUB: VHN-70048 // VULMON: CVE-2014-2109 // JVNDB: JVNDB-2014-001828 // CNNVD: CNNVD-201403-509 // NVD: CVE-2014-2109

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-70048 // JVNDB: JVNDB-2014-001828 // NVD: CVE-2014-2109

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201403-509

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201403-509

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001828

PATCH

title:cisco-sa-20140326-naturl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat

Trust: 0.8

title:33347url:http://tools.cisco.com/security/center/viewAlert.x?alertId=33347

Trust: 0.8

title:cisco-sa-20140326-naturl:http://www.cisco.com/cisco/web/support/JP/112/1122/1122245_cisco-sa-20140326-nat-j.html

Trust: 0.8

title:Cisco IOS TCP Traffic NAT Handling Patch for Memory Leaking Remote Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/44538

Trust: 0.6

title:Cisco: Cisco IOS Software Network Address Translation Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20140326-nat

Trust: 0.1

sources: CNVD: CNVD-2014-01994 // VULMON: CVE-2014-2109 // JVNDB: JVNDB-2014-001828

EXTERNAL IDS

db:NVDid:CVE-2014-2109

Trust: 3.5

db:BIDid:66470

Trust: 2.1

db:SECUNIAid:57630

Trust: 1.2

db:JVNDBid:JVNDB-2014-001828

Trust: 0.8

db:CNNVDid:CNNVD-201403-509

Trust: 0.7

db:OSVDBid:104971

Trust: 0.6

db:CNVDid:CNVD-2014-01994

Trust: 0.6

db:CISCOid:20140326 CISCO IOS SOFTWARE NETWORK ADDRESS TRANSLATION VULNERABILITIES

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.4

db:VULHUBid:VHN-70048

Trust: 0.1

db:VULMONid:CVE-2014-2109

Trust: 0.1

sources: CNVD: CNVD-2014-01994 // VULHUB: VHN-70048 // VULMON: CVE-2014-2109 // BID: 66470 // JVNDB: JVNDB-2014-001828 // CNNVD: CNNVD-201403-509 // NVD: CVE-2014-2109

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140326-nat

Trust: 2.8

url:http://www.securityfocus.com/bid/66470

Trust: 1.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2109

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2109

Trust: 0.8

url:http://osvdb.com/show/osvdb/104971

Trust: 0.6

url:http://secunia.com/advisories/57630/

Trust: 0.6

url:http://secunia.com/advisories/57630

Trust: 0.6

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.4

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=33347

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=33349

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2014-01994 // VULHUB: VHN-70048 // VULMON: CVE-2014-2109 // BID: 66470 // JVNDB: JVNDB-2014-001828 // CNNVD: CNNVD-201403-509 // NVD: CVE-2014-2109

CREDITS

Cisco

Trust: 0.3

sources: BID: 66470

SOURCES

db:CNVDid:CNVD-2014-01994
db:VULHUBid:VHN-70048
db:VULMONid:CVE-2014-2109
db:BIDid:66470
db:JVNDBid:JVNDB-2014-001828
db:CNNVDid:CNNVD-201403-509
db:NVDid:CVE-2014-2109

LAST UPDATE DATE

2025-04-13T21:39:45.033000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-01994date:2014-03-28T00:00:00
db:VULHUBid:VHN-70048date:2017-05-23T00:00:00
db:VULMONid:CVE-2014-2109date:2017-05-23T00:00:00
db:BIDid:66470date:2017-05-23T16:25:00
db:JVNDBid:JVNDB-2014-001828date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-509date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2109date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-01994date:2014-03-28T00:00:00
db:VULHUBid:VHN-70048date:2014-03-27T00:00:00
db:VULMONid:CVE-2014-2109date:2014-03-27T00:00:00
db:BIDid:66470date:2014-03-26T00:00:00
db:JVNDBid:JVNDB-2014-001828date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-509date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2109date:2014-03-27T21:55:09.033