Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105712
Category:CISCO
Title:Cisco NX-OS Software HSRP Authentication Denial of Service Vulnerability (Cisco-SA-20140611-CVE-2014-3295)
Summary:A vulnerability in Hot Standby Router Protocol (HSRP); authentication in the Cisco Nexus series could allow an unauthenticated, adjacent attacker to; affect the state of HSRP group members and cause black holing of traffic.
Description:Summary:
A vulnerability in Hot Standby Router Protocol (HSRP)
authentication in the Cisco Nexus series could allow an unauthenticated, adjacent attacker to
affect the state of HSRP group members and cause black holing of traffic.

Vulnerability Insight:
The vulnerability is due to incorrect parsing of malformed HSRP
packets. An attacker could exploit this vulnerability by sending malformed HSRP packets to bypass
HSRP authentication.

Vulnerability Impact:
An exploit could allow the attacker to bypass HSRP
authentication and affect the state of active HSRP group members, causing them to go to SPEAK
state, which leads to black holing of traffic and causes a denial of service (DoS) condition.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
4.8

CVSS Vector:
AV:A/AC:L/Au:N/C:N/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-3295
BugTraq ID: 67983
http://www.securityfocus.com/bid/67983
Cisco Security Advisory: 20140610 Cisco NX-OS Software HSRP Authentication Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3295
http://www.securitytracker.com/id/1030409
http://secunia.com/advisories/59158
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.