First published: Thu Sep 22 2016(Updated: )
The Zone-Based Firewall (ZBFW) functionality in Cisco IOS, possibly 15.4 and earlier, and IOS XE, possibly 3.13 and earlier, mishandles zone checking for existing sessions, which allows remote attackers to bypass intended resource-access restrictions via spoofed traffic that matches one of these sessions, aka Bug IDs CSCun94946 and CSCun96847.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | <=15.4\(1\)t1 | |
Cisco IOS XE | <=15.4\(3\)s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2146 has a critical severity rating due to its potential to allow unauthorized access to network resources.
To fix CVE-2014-2146, upgrade to a Cisco IOS version later than 15.4(1)t1 or a Cisco IOS XE version later than 15.4(3)s.
CVE-2014-2146 affects Cisco IOS devices, specifically version 15.4 and earlier, as well as Cisco IOS XE version 3.13 and earlier.
The attack vector for CVE-2014-2146 involves remote attackers sending spoofed traffic to bypass zone-based firewall restrictions.
There have been reports of active exploitation attempts targeting CVE-2014-2146, making it crucial to apply patches promptly.