CVE-2014-6381 (GCVE-0-2014-6381)
Vulnerability from cvelistv5 – Published: 2014-12-12 15:00 – Updated: 2024-08-06 12:17
VLAI?
Summary
Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when "Proxy ARP" or "No Broadcast" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T12:17:23.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "71612",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/71612"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031360"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-12-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \"Proxy ARP\" or \"No Broadcast\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-12-12T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "71612",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/71612"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031360"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-6381",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \"Proxy ARP\" or \"No Broadcast\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "71612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71612"
},
{
"name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662"
},
{
"name": "1031360",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031360"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-6381",
"datePublished": "2014-12-12T15:00:00",
"dateReserved": "2014-09-11T00:00:00",
"dateUpdated": "2024-08-06T12:17:23.935Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:smartpass:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBC24E9D-9B9F-445C-B45F-2DAFB305E105\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:smartpass:8.0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD6E2155-0A0E-4F83-92F6-DA8FE562D0AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:smartpass:8.0.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1A524BC-F18A-4503-8109-A3E382A22145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:smartpass:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4C06F0E-1F1E-4E6A-98FD-409A62387F6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:smartpass:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83E54C28-520F-413A-923C-52C4A17045CA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:mobile_system_software:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2303B27-A8D2-4779-A4B4-2C62DD03E9FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:mobile_system_software:8.0.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"190B5633-4ADA-44E2-9EE0-4B54CDC0031D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:mobile_system_software:8.0.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"065CC012-B3F6-4F87-9DC0-5F66362DF42F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:mobile_system_software:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"734E4638-546C-4FF8-8E4D-C73DE40A6B3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:mobile_system_software:9.0.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F432B82-61AF-445D-8960-1E14453E02A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:mobile_system_software:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A898DA64-65B0-4D5C-80F4-E336EF0389EE\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:ringmaster:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2B1DAD0-C7DB-45CD-90E7-19CC572812D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:ringmaster:8.0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BA1D222-BC4A-49D1-B180-250DA9F8F363\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:ringmaster:8.0.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D32D86F-0BB4-4849-84E1-B7DAEC8BFCB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:ringmaster:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F72F38BE-07E4-4D2A-A6EB-4B84C3C07145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:ringmaster:9.0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EEEF5D9-FFA6-4C95-B8B3-FF33C5FDF610\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:ringmaster:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83CD65A1-9C9A-4022-8401-2BC4BF9138B2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \\\"Proxy ARP\\\" or \\\"No Broadcast\\\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors.\"}, {\"lang\": \"es\", \"value\": \"Los dispositivos Juniper WLC con versiones de Software WLAN 8.0.x anterior a 8.0.4, 9.0.x anterior a 9.0.2.11, 9.0.3.x anterior a 9.0.3.5, y 9.1.x anterior a 9.1.1, cuando las caracteristicas \u0027Proxy ARP\u0027 o \u0027No Broadcast\u0027 est\\u00e1n habilitadas en una configuraci\\u00f3n en cluster, permite a atacantes remotos causar una denegaci\\u00f3n de servicio (desconexi\\u00f3n de dispositivo) a trav\\u00e9s de vectores no especificado.\"}]",
"id": "CVE-2014-6381",
"lastModified": "2024-11-21T02:14:16.887",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 2.9, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 5.5, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-12-12T15:59:03.057",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/71612\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id/1031360\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/71612\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1031360\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-6381\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-12-12T15:59:03.057\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when \\\"Proxy ARP\\\" or \\\"No Broadcast\\\" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Los dispositivos Juniper WLC con versiones de Software WLAN 8.0.x anterior a 8.0.4, 9.0.x anterior a 9.0.2.11, 9.0.3.x anterior a 9.0.3.5, y 9.1.x anterior a 9.1.1, cuando las caracteristicas \u0027Proxy ARP\u0027 o \u0027No Broadcast\u0027 est\u00e1n habilitadas en una configuraci\u00f3n en cluster, permite a atacantes remotos causar una denegaci\u00f3n de servicio (desconexi\u00f3n de dispositivo) a trav\u00e9s de vectores no especificado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":2.9,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":5.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:smartpass:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBC24E9D-9B9F-445C-B45F-2DAFB305E105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:smartpass:8.0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6E2155-0A0E-4F83-92F6-DA8FE562D0AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:smartpass:8.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1A524BC-F18A-4503-8109-A3E382A22145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:smartpass:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C06F0E-1F1E-4E6A-98FD-409A62387F6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:smartpass:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E54C28-520F-413A-923C-52C4A17045CA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:mobile_system_software:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2303B27-A8D2-4779-A4B4-2C62DD03E9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:mobile_system_software:8.0.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190B5633-4ADA-44E2-9EE0-4B54CDC0031D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:mobile_system_software:8.0.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"065CC012-B3F6-4F87-9DC0-5F66362DF42F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:mobile_system_software:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"734E4638-546C-4FF8-8E4D-C73DE40A6B3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:mobile_system_software:9.0.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F432B82-61AF-445D-8960-1E14453E02A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:mobile_system_software:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A898DA64-65B0-4D5C-80F4-E336EF0389EE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:ringmaster:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2B1DAD0-C7DB-45CD-90E7-19CC572812D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:ringmaster:8.0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA1D222-BC4A-49D1-B180-250DA9F8F363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:ringmaster:8.0.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D32D86F-0BB4-4849-84E1-B7DAEC8BFCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:ringmaster:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F72F38BE-07E4-4D2A-A6EB-4B84C3C07145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:ringmaster:9.0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EEEF5D9-FFA6-4C95-B8B3-FF33C5FDF610\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:ringmaster:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83CD65A1-9C9A-4022-8401-2BC4BF9138B2\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/71612\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1031360\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/71612\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1031360\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10662\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…