Vulnerability Details : CVE-2014-3327
The EnergyWise module in Cisco IOS 12.2, 15.0, 15.1, 15.2, and 15.4 and IOS XE 3.2.xXO, 3.3.xSG, 3.4.xSG, and 3.5.xE before 3.5.3E allows remote attackers to cause a denial of service (device reload) via a crafted IPv4 packet, aka Bug ID CSCup52101.
Vulnerability category: Input validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-3327
Probability of exploitation activity in the next 30 days: 0.86%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3327
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2014-3327
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3327
-
http://www.securityfocus.com/bid/69066
Cisco IOS and IOS XE Software CVE-2014-3327 Denial of Service VulnerabilityVDB Entry
-
http://www.securitytracker.com/id/1030682
Cisco IOS and IOS XE EnergyWise Processing Flaw Lets Remote Users Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140806-energywise
Cisco IOS Software and Cisco IOS XE Software EnergyWise Crafted Packet Denial of Service VulnerabilityVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/95137
Cisco IOS and Cisco IOS XE EnergyWise module denial of service CVE-2014-3327 Vulnerability Report
Products affected by CVE-2014-3327
- cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios:15.4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.00.xo.15.0\(2\)xo:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*