ID

VAR-201403-0480


CVE

CVE-2014-2112


TITLE

Cisco IOS of SSL VPN Denial of service in function (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2014-001830

DESCRIPTION

The SSL VPN (aka WebVPN) feature in Cisco IOS 15.1 through 15.4 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP requests, aka Bug ID CSCuf51357. There is a possibility. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS is prone to a remote denial-of-service vulnerability. Exploiting this issue may allow remote attackers to trigger denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCuf51357

Trust: 2.52

sources: NVD: CVE-2014-2112 // JVNDB: JVNDB-2014-001830 // CNVD: CNVD-2014-02020 // BID: 66462 // VULHUB: VHN-70051

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-02020

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.4

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.2

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.3

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:15.1 to 15.4

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.1-15.4

Trust: 0.6

vendor:rockwellmodel:automation stratixscope:eqversion:59000

Trust: 0.3

vendor:ciscomodel:ios software c3900 15.0 m3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.4sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.3mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2gcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.2escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1mscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.1gcscope: - version: -

Trust: 0.3

vendor:rockwellmodel:automation stratixscope:neversion:590015.6.3

Trust: 0.3

vendor:ciscomodel:ios 15.4 t1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 s2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 m2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.3 t4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 s5scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 m6scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 jb3sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.2 gc1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m8scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 m7scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 mra3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sy2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sy3scope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2014-02020 // BID: 66462 // JVNDB: JVNDB-2014-001830 // CNNVD: CNNVD-201403-511 // NVD: CVE-2014-2112

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2112
value: HIGH

Trust: 1.0

NVD: CVE-2014-2112
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-02020
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201403-511
value: HIGH

Trust: 0.6

VULHUB: VHN-70051
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-2112
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-02020
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-70051
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-02020 // VULHUB: VHN-70051 // JVNDB: JVNDB-2014-001830 // CNNVD: CNNVD-201403-511 // NVD: CVE-2014-2112

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-70051 // JVNDB: JVNDB-2014-001830 // NVD: CVE-2014-2112

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201403-511

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201403-511

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001830

PATCH

title:cisco-sa-20140326-ios-sslvpnurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ios-sslvpn

Trust: 0.8

title:33350url:http://tools.cisco.com/security/center/viewAlert.x?alertId=33350

Trust: 0.8

title:cisco-sa-20140326-ios-sslvpnurl:http://www.cisco.com/cisco/web/support/JP/112/1122/1122241_cisco-sa-20140326-ios-sslvpn-j.html

Trust: 0.8

title:Patch for Cisco IOS SSL VPN Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/44560

Trust: 0.6

sources: CNVD: CNVD-2014-02020 // JVNDB: JVNDB-2014-001830

EXTERNAL IDS

db:NVDid:CVE-2014-2112

Trust: 3.4

db:BIDid:66462

Trust: 2.0

db:JVNDBid:JVNDB-2014-001830

Trust: 0.8

db:CNNVDid:CNNVD-201403-511

Trust: 0.7

db:OSVDBid:104970

Trust: 0.6

db:CNVDid:CNVD-2014-02020

Trust: 0.6

db:SECUNIAid:57629

Trust: 0.6

db:CISCOid:20140326 CISCO IOS SOFTWARE SSL VPN DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:ICS CERTid:ICSA-17-094-04

Trust: 0.3

db:VULHUBid:VHN-70051

Trust: 0.1

sources: CNVD: CNVD-2014-02020 // VULHUB: VHN-70051 // BID: 66462 // JVNDB: JVNDB-2014-001830 // CNNVD: CNNVD-201403-511 // NVD: CVE-2014-2112

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140326-ios-sslvpn

Trust: 2.6

url:http://www.securityfocus.com/bid/66462

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2112

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2112

Trust: 0.8

url:http://osvdb.com/show/osvdb/104970

Trust: 0.6

url:http://secunia.com/advisories/57629

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-094-04

Trust: 0.3

sources: CNVD: CNVD-2014-02020 // VULHUB: VHN-70051 // BID: 66462 // JVNDB: JVNDB-2014-001830 // CNNVD: CNNVD-201403-511 // NVD: CVE-2014-2112

CREDITS

Cisco

Trust: 0.3

sources: BID: 66462

SOURCES

db:CNVDid:CNVD-2014-02020
db:VULHUBid:VHN-70051
db:BIDid:66462
db:JVNDBid:JVNDB-2014-001830
db:CNNVDid:CNNVD-201403-511
db:NVDid:CVE-2014-2112

LAST UPDATE DATE

2025-04-13T20:54:49.955000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-02020date:2014-03-31T00:00:00
db:VULHUBid:VHN-70051date:2017-05-23T00:00:00
db:BIDid:66462date:2017-05-23T16:25:00
db:JVNDBid:JVNDB-2014-001830date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-511date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2112date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-02020date:2014-03-31T00:00:00
db:VULHUBid:VHN-70051date:2014-03-27T00:00:00
db:BIDid:66462date:2014-03-26T00:00:00
db:JVNDBid:JVNDB-2014-001830date:2014-03-31T00:00:00
db:CNNVDid:CNNVD-201403-511date:2014-03-28T00:00:00
db:NVDid:CVE-2014-2112date:2014-03-27T21:55:09.080