cve-2014-2108
Vulnerability from cvelistv5
Published
2014-03-27 21:00
Modified
2024-08-06 10:05
Severity ?
Summary
Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.2 through 3.7 before 3.7.5S and 3.8 through 3.10 before 3.10.1S allow remote attackers to cause a denial of service (device reload) via a malformed IKEv2 packet, aka Bug ID CSCui88426.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:05:59.461Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20140326 Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.2 through 3.7 before 3.7.5S and 3.8 through 3.10 before 3.10.1S allow remote attackers to cause a denial of service (device reload) via a malformed IKEv2 packet, aka Bug ID CSCui88426."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-27T20:57:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20140326 Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-2108",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.2 through 3.7 before 3.7.5S and 3.8 through 3.10 before 3.10.1S allow remote attackers to cause a denial of service (device reload) via a malformed IKEv2 packet, aka Bug ID CSCui88426."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20140326 Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-2108",
    "datePublished": "2014-03-27T21:00:00",
    "dateReserved": "2014-02-25T00:00:00",
    "dateUpdated": "2024-08-06T10:05:59.461Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF87CC9A-1AF5-4DB4-ACE5-DB938D3B2F84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"971AAF00-63AA-4B3F-8E0F-B8FBD011C071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB41294E-F3DF-4F1E-A4C8-E90B21A88836\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2AB6A02-B7C7-48D1-8857-BD1CDF9A40D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B870F917-9F35-41AE-8CCA-D8574189C7EC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"621845E0-E885-46E4-929D-55DBE43DC97F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86C0900A-1354-4A20-B5ED-8C005BCE4D74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6256C79-DBDA-4ED7-AA3B-DE78B8C387B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"429F3E17-5C65-4C91-8881-AAEAA00BCD44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F47E76FF-DE36-463D-B610-A99C90AF7B91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3104D911-5FFC-4605-B234-6FD40A206DC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC787C70-6540-4AF7-9F05-8FD86284091E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC716D3D-5C37-4E36-8F6B-53801DC7225E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2s\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AFAED3F-FD5E-41BF-8851-FCCECFEB14EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2s\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D03F01E-D9B7-4AA3-9952-7AD0B54E2400\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2s\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D011179-6277-4BE9-AFE9-9ACE3216F08E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEF8A6EC-3C45-4CDB-81B5-4D50CD5C4087\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A52C1850-27F7-40C8-BA26-660D160AD163\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"737D7668-872C-4246-9AB9-12FF059E231A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AAC822D-E886-46A9-80E8-06DD753A458E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4CBDA4F-DBB3-4426-8C16-2B2314ACF21D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41E237F6-97DA-45AE-8505-B3F629AB026D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3s\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF78C82D-B8A9-47F6-983B-4F315024981D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3s\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE97CB97-258C-40DD-8596-1BBD70FF0AC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3s\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DD097AB-515E-4F59-9BE1-EABC05B65661\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B45225F2-C9EB-493D-B845-64BFB8DBB89B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"252377A3-7F15-45F2-A169-BBC37858D4DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02E8F96A-EA9C-4E66-8491-9B2A3A4023F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85908754-8426-49D3-BCC2-AF174B5D0EF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F5BA973-D59A-4CB9-BC35-089F88737425\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E6E83FC-CFAE-45EA-9F20-830FC5E97399\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.5s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1B3BCAC-8317-41C4-9A60-85B693818044\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7D36DA8-0CBC-424F-80FB-A59839C49FE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"957D6A9D-35C3-4EF8-839F-DCA1E4F1AA5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01834BC0-31A7-4805-8463-A1F637D1F9BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE0299C4-71D1-4389-B728-453760D05366\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D0A24C9-B650-4DA4-AA63-00660BDB3513\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"638EE83A-C3CA-4110-9C4B-2BB7EA3C4AAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F8C5332-DD2A-47C7-9B1D-1834A8EE267D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"214ED89B-69B0-46A9-ABA3-2EF2370A2D71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5872A42F-745E-4EC6-8679-C28F79F6621C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86947E54-A1B9-4ECE-92A6-417462249612\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C910BE7C-517F-4E41-8433-1858F700AA22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A862D914-CE60-48A9-9D52-299642BE3FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5s\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E585F9A7-3693-44EF-BBF9-9EA0EBCC1526\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5s\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"414646EA-063D-41F4-8EA9-4B69559EE700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5s\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B3BC6AA-59AA-473F-99BC-30A91553A204\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EB5A06F-59B5-43A1-8D06-1B6BA08630A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5F6C44-DB9D-41FD-AD8D-AF45258772DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D9E07C9-4C98-48A3-ACF9-1C6FE834D19C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6s\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2112F7EB-4C90-421C-9797-7297DC095140\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6s\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74A029C5-4153-462F-86F4-83F713471D0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6s\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D8EDD2E-0FEB-4296-B733-275B7ED01064\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E979597C-E614-45E9-9AC4-66DE323221BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55E908D0-7327-42B7-81C0-FA25BF45929C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5420E152-A00C-406C-8E27-6B7ADE4ABF5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7s\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"274A45E0-F556-4AFB-9050-BE99DE308206\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7s\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34F50A18-1849-4205-A553-3F16CDA39850\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2835C64E-808F-4A6C-B245-7A9996FAFE3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8s\\\\(.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B79934A-7B54-46F7-AD4F-C7756D647633\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8s\\\\(.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D50BF2F7-363D-434C-8F5E-0D05F93E99BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8s\\\\(.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84435710-504F-4838-A488-FB1218D5111F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94227B25-5C86-453C-9DC8-A8201C1D1FEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10F278DC-5102-4A18-9C72-E8FEEDCC5729\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A10EA18-B637-4792-A3CB-E29705893148\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.2 through 3.7 before 3.7.5S and 3.8 through 3.10 before 3.10.1S allow remote attackers to cause a denial of service (device reload) via a malformed IKEv2 packet, aka Bug ID CSCui88426.\"}, {\"lang\": \"es\", \"value\": \"Cisco IOS 12.2 y 15.0 hasta 15.3 y IOS XE 3.2 hasta 3.7 anterior a 3.7.5S y 3.8 hasta 3.10 anterior a 3.10.1S permiten a atacantes remotos causar una denegaci\\u00f3n de servicio (reinicio de dispositivo) a trav\\u00e9s de un paquete IKEv2 malformado, tambi\\u00e9n conocido como Bug ID CSCui88426.\"}]",
      "id": "CVE-2014-2108",
      "lastModified": "2024-11-21T02:05:40.100",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2014-03-27T21:55:09.003",
      "references": "[{\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-2108\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2014-03-27T21:55:09.003\",\"lastModified\":\"2024-11-21T02:05:40.100\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.2 through 3.7 before 3.7.5S and 3.8 through 3.10 before 3.10.1S allow remote attackers to cause a denial of service (device reload) via a malformed IKEv2 packet, aka Bug ID CSCui88426.\"},{\"lang\":\"es\",\"value\":\"Cisco IOS 12.2 y 15.0 hasta 15.3 y IOS XE 3.2 hasta 3.7 anterior a 3.7.5S y 3.8 hasta 3.10 anterior a 3.10.1S permiten a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio de dispositivo) a trav\u00e9s de un paquete IKEv2 malformado, tambi\u00e9n conocido como Bug ID CSCui88426.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF87CC9A-1AF5-4DB4-ACE5-DB938D3B2F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"971AAF00-63AA-4B3F-8E0F-B8FBD011C071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB41294E-F3DF-4F1E-A4C8-E90B21A88836\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2AB6A02-B7C7-48D1-8857-BD1CDF9A40D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B870F917-9F35-41AE-8CCA-D8574189C7EC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"621845E0-E885-46E4-929D-55DBE43DC97F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86C0900A-1354-4A20-B5ED-8C005BCE4D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6256C79-DBDA-4ED7-AA3B-DE78B8C387B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429F3E17-5C65-4C91-8881-AAEAA00BCD44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F47E76FF-DE36-463D-B610-A99C90AF7B91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3104D911-5FFC-4605-B234-6FD40A206DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC787C70-6540-4AF7-9F05-8FD86284091E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC716D3D-5C37-4E36-8F6B-53801DC7225E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2s\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AFAED3F-FD5E-41BF-8851-FCCECFEB14EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2s\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D03F01E-D9B7-4AA3-9952-7AD0B54E2400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2s\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D011179-6277-4BE9-AFE9-9ACE3216F08E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF8A6EC-3C45-4CDB-81B5-4D50CD5C4087\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A52C1850-27F7-40C8-BA26-660D160AD163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"737D7668-872C-4246-9AB9-12FF059E231A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAC822D-E886-46A9-80E8-06DD753A458E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4CBDA4F-DBB3-4426-8C16-2B2314ACF21D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E237F6-97DA-45AE-8505-B3F629AB026D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3s\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF78C82D-B8A9-47F6-983B-4F315024981D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3s\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE97CB97-258C-40DD-8596-1BBD70FF0AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3s\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD097AB-515E-4F59-9BE1-EABC05B65661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B45225F2-C9EB-493D-B845-64BFB8DBB89B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"252377A3-7F15-45F2-A169-BBC37858D4DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E8F96A-EA9C-4E66-8491-9B2A3A4023F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85908754-8426-49D3-BCC2-AF174B5D0EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5BA973-D59A-4CB9-BC35-089F88737425\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E6E83FC-CFAE-45EA-9F20-830FC5E97399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1B3BCAC-8317-41C4-9A60-85B693818044\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7D36DA8-0CBC-424F-80FB-A59839C49FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957D6A9D-35C3-4EF8-839F-DCA1E4F1AA5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01834BC0-31A7-4805-8463-A1F637D1F9BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0299C4-71D1-4389-B728-453760D05366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D0A24C9-B650-4DA4-AA63-00660BDB3513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638EE83A-C3CA-4110-9C4B-2BB7EA3C4AAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F8C5332-DD2A-47C7-9B1D-1834A8EE267D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4s\\\\(.6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214ED89B-69B0-46A9-ABA3-2EF2370A2D71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5872A42F-745E-4EC6-8679-C28F79F6621C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86947E54-A1B9-4ECE-92A6-417462249612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C910BE7C-517F-4E41-8433-1858F700AA22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A862D914-CE60-48A9-9D52-299642BE3FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5s\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E585F9A7-3693-44EF-BBF9-9EA0EBCC1526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5s\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"414646EA-063D-41F4-8EA9-4B69559EE700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5s\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B3BC6AA-59AA-473F-99BC-30A91553A204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB5A06F-59B5-43A1-8D06-1B6BA08630A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5F6C44-DB9D-41FD-AD8D-AF45258772DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9E07C9-4C98-48A3-ACF9-1C6FE834D19C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6s\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2112F7EB-4C90-421C-9797-7297DC095140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6s\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74A029C5-4153-462F-86F4-83F713471D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6s\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D8EDD2E-0FEB-4296-B733-275B7ED01064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E979597C-E614-45E9-9AC4-66DE323221BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55E908D0-7327-42B7-81C0-FA25BF45929C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5420E152-A00C-406C-8E27-6B7ADE4ABF5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7s\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"274A45E0-F556-4AFB-9050-BE99DE308206\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7s\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34F50A18-1849-4205-A553-3F16CDA39850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2835C64E-808F-4A6C-B245-7A9996FAFE3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8s\\\\(.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B79934A-7B54-46F7-AD4F-C7756D647633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8s\\\\(.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50BF2F7-363D-434C-8F5E-0D05F93E99BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8s\\\\(.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84435710-504F-4838-A488-FB1218D5111F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94227B25-5C86-453C-9DC8-A8201C1D1FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F278DC-5102-4A18-9C72-E8FEEDCC5729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A10EA18-B637-4792-A3CB-E29705893148\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.