ID

VAR-201403-0479


CVE

CVE-2014-2111


TITLE

Cisco IOS of Application Layer Gateway Service disruption in modules (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-001829

DESCRIPTION

The Application Layer Gateway (ALG) module in Cisco IOS 12.2 through 12.4 and 15.0 through 15.4, when NAT is used, allows remote attackers to cause a denial of service (device reload) via crafted DNS packets, aka Bug ID CSCue00996. There is a possibility. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. This issue is being tracked by Cisco Bug ID CSCue00996, CSCuh33843 and CSCuj41494

Trust: 2.52

sources: NVD: CVE-2014-2111 // JVNDB: JVNDB-2014-001829 // CNVD: CNVD-2014-01995 // BID: 66470 // VULHUB: VHN-70050

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-01995

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.4

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2 to 12.4

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.0 to 15.4

Trust: 0.8

vendor:ciscomodel:ios softwarescope: - version: -

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios 15.4sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1snhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sngscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.0mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4xv

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zyascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xndscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xncscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xnascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2segscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sccscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ixgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2iriscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ircscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2irbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2exscope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

sources: CNVD: CNVD-2014-01995 // BID: 66470 // JVNDB: JVNDB-2014-001829 // CNNVD: CNNVD-201403-510 // NVD: CVE-2014-2111

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2111
value: HIGH

Trust: 1.0

NVD: CVE-2014-2111
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-01995
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201403-510
value: HIGH

Trust: 0.6

VULHUB: VHN-70050
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-2111
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-01995
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-70050
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-01995 // VULHUB: VHN-70050 // JVNDB: JVNDB-2014-001829 // CNNVD: CNNVD-201403-510 // NVD: CVE-2014-2111

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-70050 // JVNDB: JVNDB-2014-001829 // NVD: CVE-2014-2111

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201403-510

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201403-510

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001829

PATCH

title:cisco-sa-20140326-naturl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat

Trust: 0.8

title:3879/0url:http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=3879&signatureSubId=0&softwareVersion=6.0&releaseVersion=S781

Trust: 0.8

title:33349url:http://tools.cisco.com/security/center/viewAlert.x?alertId=33349

Trust: 0.8

title:cisco-sa-20140326-naturl:http://www.cisco.com/cisco/web/support/JP/112/1122/1122245_cisco-sa-20140326-nat-j.html

Trust: 0.8

title:Cisco IOS DNS Traffic NAT Handling Remote Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/44537

Trust: 0.6

sources: CNVD: CNVD-2014-01995 // JVNDB: JVNDB-2014-001829

EXTERNAL IDS

db:NVDid:CVE-2014-2111

Trust: 3.4

db:BIDid:66470

Trust: 2.0

db:SECUNIAid:57630

Trust: 1.2

db:JVNDBid:JVNDB-2014-001829

Trust: 0.8

db:CNNVDid:CNNVD-201403-510

Trust: 0.7

db:OSVDBid:104966

Trust: 0.6

db:CNVDid:CNVD-2014-01995

Trust: 0.6

db:CISCOid:20140326 CISCO IOS SOFTWARE NETWORK ADDRESS TRANSLATION VULNERABILITIES

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.3

db:VULHUBid:VHN-70050

Trust: 0.1

sources: CNVD: CNVD-2014-01995 // VULHUB: VHN-70050 // BID: 66470 // JVNDB: JVNDB-2014-001829 // CNNVD: CNNVD-201403-510 // NVD: CVE-2014-2111

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140326-nat

Trust: 2.6

url:http://www.securityfocus.com/bid/66470

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2111

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2111

Trust: 0.8

url:http://osvdb.com/show/osvdb/104966

Trust: 0.6

url:http://secunia.com/advisories/57630/

Trust: 0.6

url:http://secunia.com/advisories/57630

Trust: 0.6

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=33347

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=33349

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.3

sources: CNVD: CNVD-2014-01995 // VULHUB: VHN-70050 // BID: 66470 // JVNDB: JVNDB-2014-001829 // CNNVD: CNNVD-201403-510 // NVD: CVE-2014-2111

CREDITS

Cisco

Trust: 0.3

sources: BID: 66470

SOURCES

db:CNVDid:CNVD-2014-01995
db:VULHUBid:VHN-70050
db:BIDid:66470
db:JVNDBid:JVNDB-2014-001829
db:CNNVDid:CNNVD-201403-510
db:NVDid:CVE-2014-2111

LAST UPDATE DATE

2025-04-13T20:57:18.169000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-01995date:2014-03-28T00:00:00
db:VULHUBid:VHN-70050date:2017-05-23T00:00:00
db:BIDid:66470date:2017-05-23T16:25:00
db:JVNDBid:JVNDB-2014-001829date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-510date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2111date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-01995date:2014-03-28T00:00:00
db:VULHUBid:VHN-70050date:2014-03-27T00:00:00
db:BIDid:66470date:2014-03-26T00:00:00
db:JVNDBid:JVNDB-2014-001829date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-510date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2111date:2014-03-27T21:55:09.063