First published: Sat Jun 14 2014(Updated: )
The HSRP implementation in Cisco NX-OS 6.2(2a) and earlier allows remote attackers to bypass authentication and cause a denial of service (group-member state modification and traffic blackholing) via malformed HSRP packets, aka Bug ID CSCup11309.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | <=6.2\(2a\) | |
Cisco NX-OS | =4.1.\(2\) | |
Cisco NX-OS | =4.1.\(3\) | |
Cisco NX-OS | =4.1.\(4\) | |
Cisco NX-OS | =4.1.\(5\) | |
Cisco NX-OS | =4.2\(3\) | |
Cisco NX-OS | =4.2\(4\) | |
Cisco NX-OS | =4.2\(6\) | |
Cisco NX-OS | =4.2\(8\) | |
Cisco NX-OS | =4.2.\(2a\) | |
Cisco NX-OS | =5.0\(2a\) | |
Cisco NX-OS | =5.0\(3\) | |
Cisco NX-OS | =5.0\(5\) | |
Cisco NX-OS | =5.1\(1a\) | |
Cisco NX-OS | =5.1\(3\) | |
Cisco NX-OS | =5.1\(4\) | |
Cisco NX-OS | =5.1\(5\) | |
Cisco NX-OS | =5.1\(6\) | |
Cisco NX-OS | =5.2\(1\) | |
Cisco NX-OS | =5.2\(3a\) | |
Cisco NX-OS | =5.2\(4\) | |
Cisco NX-OS | =5.2\(5\) | |
Cisco NX-OS | =5.2\(7\) | |
Cisco NX-OS | =5.2\(9\) | |
Cisco NX-OS | =6.0\(1\) | |
Cisco NX-OS | =6.0\(2\) | |
Cisco NX-OS | =6.0\(3\) | |
Cisco NX-OS | =6.0\(4\) | |
Cisco NX-OS | =6.1\(1\) | |
Cisco NX-OS | =6.1\(2\) | |
Cisco NX-OS | =6.1\(3\) | |
Cisco NX-OS | =6.1\(4\) | |
Cisco NX-OS | =6.1\(4a\) | |
Cisco NX-OS | =6.2\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3295 has a significant severity rating due to its potential to allow unauthorized access and denial of service on affected Cisco NX-OS devices.
To fix CVE-2014-3295, upgrade to a patched version of Cisco NX-OS that addresses the vulnerability.
CVE-2014-3295 affects multiple versions of Cisco NX-OS, including versions up to and including 6.2(2a).
CVE-2014-3295 can be exploited through malformed HSRP packets, leading to authentication bypass and denial of service.
There is no effective workaround for CVE-2014-3295, and upgrading to a secure version is strongly recommended.