CVE-2014-7997 (GCVE-0-2014-7997)

Vulnerability from cvelistv5 – Published: 2014-11-15 02:00 – Updated: 2024-08-06 13:03
VLAI?
Summary
The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.650Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-aironet-cve20147997-dos(98691)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
          },
          {
            "name": "1031218",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031218"
          },
          {
            "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-11-14T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-aironet-cve20147997-dos(98691)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
        },
        {
          "name": "1031218",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031218"
        },
        {
          "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-7997",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-aironet-cve20147997-dos(98691)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
            },
            {
              "name": "1031218",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031218"
            },
            {
              "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-7997",
    "datePublished": "2014-11-15T02:00:00.000Z",
    "dateReserved": "2014-10-08T00:00:00.000Z",
    "dateUpdated": "2024-08-06T13:03:27.650Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-7997\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2014-11-15T02:59:01.517\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n DHCP en Cisco IOS en puntos de acceso Aironet no maneja debidamente las condiciones de error con concesiones cortas ni los intentos de renovaci\u00f3n de concesi\u00f3n sin \u00e9xito, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) mediante la activaci\u00f3n de una transici\u00f3n a un estado de recuperaci\u00f3n con la intenci\u00f3n de provocar un reinicio de la interfaz de red, pero en realidad implica un reinicio completo del dispositivo, tambi\u00e9n conocido como Bug ID CSCtn16281.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":6.1,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6230A85-30D2-4934-A8A0-11499B7B09F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7361553C-439A-4EFC-B47C-5D099132A9BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42E54595-DEA2-4CDA-B218-89B034EB129F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900C8376-9891-4CAF-8873-1CE78CFEB050\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D385DFB0-FE3D-4217-B17A-1AB4A34363AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AFB6B7-F5A5-4F87-A149-53FC82D5D863\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3600e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35E201F1-02D0-4023-9A50-3D8F1A9EC357\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3600i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65CBE08A-4F2B-452D-B3B3-034DE13E86CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3600p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE92197-190B-466A-B7A7-268051DA4395\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"903A79E0-184A-4CFB-96FA-A3E0474503FD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D56D069-0E19-4E60-A30A-23C27964B674\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA740581-ED86-4822-9516-BCCA4C267561\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8B5553-7295-4786-9F81-B4527EAD4F0B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01A48851-D4D5-4ABC-A44A-F82A97882C45\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AAA8DE4-4E1D-4286-846D-0381BF68632F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17BBE092-4156-45E8-A7ED-55C2765580CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02967F7-FC29-460E-A07E-99397E55A63F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D84F4CEF-F599-48EE-A5FA-252880332A84\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8F1355-5A18-4692-B54C-083291E751E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97943532-2C6A-4867-BD40-1B848BD2009A\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1031218\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/98691\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1031218\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/98691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…