Search criteria
3 vulnerabilities found for mobile_system_software by juniper
FKIE_CVE-2014-6381
Vulnerability from fkie_nvd - Published: 2014-12-12 15:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when "Proxy ARP" or "No Broadcast" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | smartpass | 8.0 | |
| juniper | smartpass | 8.0.2.1 | |
| juniper | smartpass | 8.0.3.1 | |
| juniper | smartpass | 9.0 | |
| juniper | smartpass | 9.1 | |
| juniper | mobile_system_software | 8.0 | |
| juniper | mobile_system_software | 8.0.2.2 | |
| juniper | mobile_system_software | 8.0.3.6 | |
| juniper | mobile_system_software | 9.0 | |
| juniper | mobile_system_software | 9.0.2.5 | |
| juniper | mobile_system_software | 9.1 | |
| juniper | ringmaster | 8.0 | |
| juniper | ringmaster | 8.0.2.1 | |
| juniper | ringmaster | 8.0.3.2 | |
| juniper | ringmaster | 9.0 | |
| juniper | ringmaster | 9.0.2.1 | |
| juniper | ringmaster | 9.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:juniper:smartpass:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC24E9D-9B9F-445C-B45F-2DAFB305E105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:smartpass:8.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6E2155-0A0E-4F83-92F6-DA8FE562D0AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:smartpass:8.0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A524BC-F18A-4503-8109-A3E382A22145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:smartpass:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E4C06F0E-1F1E-4E6A-98FD-409A62387F6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:smartpass:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83E54C28-520F-413A-923C-52C4A17045CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:juniper:mobile_system_software:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E2303B27-A8D2-4779-A4B4-2C62DD03E9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:mobile_system_software:8.0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "190B5633-4ADA-44E2-9EE0-4B54CDC0031D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:mobile_system_software:8.0.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "065CC012-B3F6-4F87-9DC0-5F66362DF42F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:mobile_system_software:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "734E4638-546C-4FF8-8E4D-C73DE40A6B3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:mobile_system_software:9.0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9F432B82-61AF-445D-8960-1E14453E02A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:mobile_system_software:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A898DA64-65B0-4D5C-80F4-E336EF0389EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:juniper:ringmaster:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B1DAD0-C7DB-45CD-90E7-19CC572812D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:ringmaster:8.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA1D222-BC4A-49D1-B180-250DA9F8F363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:ringmaster:8.0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D32D86F-0BB4-4849-84E1-B7DAEC8BFCB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:ringmaster:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F72F38BE-07E4-4D2A-A6EB-4B84C3C07145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:ringmaster:9.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5EEEF5D9-FFA6-4C95-B8B3-FF33C5FDF610",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:ringmaster:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "83CD65A1-9C9A-4022-8401-2BC4BF9138B2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \"Proxy ARP\" or \"No Broadcast\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors."
},
{
"lang": "es",
"value": "Los dispositivos Juniper WLC con versiones de Software WLAN 8.0.x anterior a 8.0.4, 9.0.x anterior a 9.0.2.11, 9.0.3.x anterior a 9.0.3.5, y 9.1.x anterior a 9.1.1, cuando las caracteristicas \u0027Proxy ARP\u0027 o \u0027No Broadcast\u0027 est\u00e1n habilitadas en una configuraci\u00f3n en cluster, permite a atacantes remotos causar una denegaci\u00f3n de servicio (desconexi\u00f3n de dispositivo) a trav\u00e9s de vectores no especificado."
}
],
"id": "CVE-2014-6381",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-12-12T15:59:03.057",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/71612"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1031360"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/71612"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1031360"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-6381 (GCVE-0-2014-6381)
Vulnerability from cvelistv5 – Published: 2014-12-12 15:00 – Updated: 2024-08-06 12:17
VLAI?
Summary
Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when "Proxy ARP" or "No Broadcast" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T12:17:23.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "71612",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/71612"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031360"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-12-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \"Proxy ARP\" or \"No Broadcast\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-12-12T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "71612",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/71612"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031360"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-6381",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \"Proxy ARP\" or \"No Broadcast\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "71612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71612"
},
{
"name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031360"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-6381",
"datePublished": "2014-12-12T15:00:00",
"dateReserved": "2014-09-11T00:00:00",
"dateUpdated": "2024-08-06T12:17:23.935Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-6381 (GCVE-0-2014-6381)
Vulnerability from nvd – Published: 2014-12-12 15:00 – Updated: 2024-08-06 12:17
VLAI?
Summary
Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when "Proxy ARP" or "No Broadcast" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T12:17:23.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "71612",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/71612"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031360"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-12-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \"Proxy ARP\" or \"No Broadcast\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-12-12T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "71612",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/71612"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031360"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-6381",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \"Proxy ARP\" or \"No Broadcast\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "71612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71612"
},
{
"name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031360"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-6381",
"datePublished": "2014-12-12T15:00:00",
"dateReserved": "2014-09-11T00:00:00",
"dateUpdated": "2024-08-06T12:17:23.935Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}