First published: Fri Apr 04 2014(Updated: )
The IKE implementation in Cisco IOS 15.4(1)T and earlier and IOS XE allows remote attackers to cause a denial of service (security-association drop) via crafted Main Mode packets, aka Bug ID CSCun31021.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | <=15.4\(1\)t | |
Cisco IOS | =15.0 | |
Cisco IOS | =15.0\(1\)se | |
Cisco IOS | =15.1 | |
Cisco IOS | =15.2 | |
Cisco IOS | =15.3 | |
Cisco IOS | =15.3\(2\)s | |
Cisco IOS | =15.3\(3\)m | |
Cisco IOS | =15.3\(3\)m1 | |
Cisco IOS | =15.3\(3\)m2 | |
Cisco IOS | =15.3\(3\)s | |
Cisco IOS | =15.3s | |
Cisco IOS | =15.4 | |
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2143 is rated as a medium severity vulnerability that can cause denial of service.
The fix for CVE-2014-2143 involves upgrading to a fixed version of Cisco IOS or IOS XE that addresses this vulnerability.
CVE-2014-2143 affects Cisco IOS versions up to 15.4(1)T and several earlier versions including 15.0, 15.1, 15.2, and 15.3.
Yes, CVE-2014-2143 can be exploited remotely by attackers through crafted Main Mode packets.
CVE-2014-2143 can lead to security association drops, severely disrupting connectivity for affected devices.