Lucene search

K
ciscoCiscoCISCO-SA-20140919-CVE-2014-3378
HistorySep 19, 2014 - 8:01 p.m.

Cisco IOS XR Software Malformed TACACS+ Packet Denial of Service Vulnerability

2014-09-1920:01:54
tools.cisco.com
21

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.023

Percentile

89.7%

A vulnerability in TACACS+ processing of Cisco IOS XR could allow an unauthenticated, remote attacker to cause a reload of the TACACS+ daemon (tacacsd) on the affected device.

The vulnerability is due to improper parsing of a malformed TACACS+ packet. An attacker could exploit this vulnerability by sending a malformed TACACS+ packet to be processed by an affected device. An exploit could allow the attacker to cause a reload of the TACACS+ process on the device.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker may need access to trusted, internal networks behind a firewall to send malformed TACACS+ packets to the targeted device. This access requirement may reduce the likelihood of a successful exploit. In addition, the attacker may need to obtain additional information, such as whether the device has TACACS+ configured, which is a condition that must be met to exploit this vulnerability.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoios_xr_softwareMatchany
OR
ciscoios_xr_softwareMatchany
VendorProductVersionCPE
ciscoios_xr_softwareanycpe:2.3:o:cisco:ios_xr_software:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.023

Percentile

89.7%

Related for CISCO-SA-20140919-CVE-2014-3378