var-201410-0057
Vulnerability from variot
Cisco IOS XR on ASR 9000 devices does not properly use compression for port-range and address-range encoding, which allows remote attackers to bypass intended Typhoon line-card ACL restrictions via transit traffic, aka Bug ID CSCup30133. Vendors have confirmed this vulnerability Bug ID CSCup30133 It is released as.By a third party via transit traffic, Typhoon Line card ACL You may be able to work around the limitation. Cisco IOS XR is a fully modular, distributed network operating system from Cisco's IOS software family. An attacker can exploit this issue to bypass the access list and perform unauthorized actions. This issue is being tracked by Cisco Bug ID CSCup30133. The vulnerability is caused by the incorrect compression of port-range and address-range encoding. A remote attacker can exploit this vulnerability to bypass the established Typhoon line-card ACL restrictions by means of relay communication
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201410-0057", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios xr", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "asr 9001", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9010", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9922", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9006", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ios xr", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "asr 9912", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9000 rsp440 router", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9904", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "asr 9000 series rsp440", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 9001 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 9006 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 9010 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 9904 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 9912 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr 9922 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ios xr software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06555" }, { "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "db": "NVD", "id": "CVE-2014-3396" }, { "db": "CNNVD", "id": "CNNVD-201410-109" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9000_rsp440_router:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-3396" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "70236" } ], "trust": 0.3 }, "cve": "CVE-2014-3396", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-3396", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-06555", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-71336", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-3396", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2014-06555", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201410-109", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-71336", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06555" }, { "db": "VULHUB", "id": "VHN-71336" }, { "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "db": "NVD", "id": "CVE-2014-3396" }, { "db": "CNNVD", "id": "CNNVD-201410-109" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS XR on ASR 9000 devices does not properly use compression for port-range and address-range encoding, which allows remote attackers to bypass intended Typhoon line-card ACL restrictions via transit traffic, aka Bug ID CSCup30133. Vendors have confirmed this vulnerability Bug ID CSCup30133 It is released as.By a third party via transit traffic, Typhoon Line card ACL You may be able to work around the limitation. Cisco IOS XR is a fully modular, distributed network operating system from Cisco\u0027s IOS software family. \nAn attacker can exploit this issue to bypass the access list and perform unauthorized actions. \nThis issue is being tracked by Cisco Bug ID CSCup30133. The vulnerability is caused by the incorrect compression of port-range and address-range encoding. A remote attacker can exploit this vulnerability to bypass the established Typhoon line-card ACL restrictions by means of relay communication", "sources": [ { "db": "NVD", "id": "CVE-2014-3396" }, { "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "db": "CNVD", "id": "CNVD-2014-06555" }, { "db": "BID", "id": "70236" }, { "db": "VULHUB", "id": "VHN-71336" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3396", "trust": 3.4 }, { "db": "BID", "id": "70236", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-004526", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201410-109", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-06555", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-71336", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06555" }, { "db": "VULHUB", "id": "VHN-71336" }, { "db": "BID", "id": "70236" }, { "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "db": "NVD", "id": "CVE-2014-3396" }, { "db": "CNNVD", "id": "CNNVD-201410-109" } ] }, "id": "VAR-201410-0057", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-06555" }, { "db": "VULHUB", "id": "VHN-71336" } ], "trust": 1.25286753 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06555" } ] }, "last_update_date": "2023-12-18T13:24:53.237000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco IOS XR Software Compression ACL Bypass Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3396" }, { "title": "35944", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=35944" }, { "title": "Cisco IOS XR Software Security Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/50629" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06555" }, { "db": "JVNDB", "id": "JVNDB-2014-004526" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71336" }, { "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "db": "NVD", "id": "CVE-2014-3396" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-3396" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3396" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3396" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-06555" }, { "db": "VULHUB", "id": "VHN-71336" }, { "db": "BID", "id": "70236" }, { "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "db": "NVD", "id": "CVE-2014-3396" }, { "db": "CNNVD", "id": "CNNVD-201410-109" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-06555" }, { "db": "VULHUB", "id": "VHN-71336" }, { "db": "BID", "id": "70236" }, { "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "db": "NVD", "id": "CVE-2014-3396" }, { "db": "CNNVD", "id": "CNNVD-201410-109" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-09T00:00:00", "db": "CNVD", "id": "CNVD-2014-06555" }, { "date": "2014-10-05T00:00:00", "db": "VULHUB", "id": "VHN-71336" }, { "date": "2014-10-03T00:00:00", "db": "BID", "id": "70236" }, { "date": "2014-10-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "date": "2014-10-05T01:55:13.110000", "db": "NVD", "id": "CVE-2014-3396" }, { "date": "2014-10-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-109" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-09T00:00:00", "db": "CNVD", "id": "CNVD-2014-06555" }, { "date": "2014-10-06T00:00:00", "db": "VULHUB", "id": "VHN-71336" }, { "date": "2014-10-03T00:00:00", "db": "BID", "id": "70236" }, { "date": "2014-10-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-004526" }, { "date": "2014-10-06T18:30:53.297000", "db": "NVD", "id": "CVE-2014-3396" }, { "date": "2014-10-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-109" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-109" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural ASR 9000 Run on device Cisco IOS XR In Typhoon Line card ACL Vulnerabilities that can be bypassed", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-004526" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-109" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.