VAR-201405-0171
Vulnerability from variot - Updated: 2025-04-13 23:18Cisco Nexus 1000V InterCloud 5.2(1)IC1(1.2) and earlier for VMware allows remote attackers to bypass ACL deny statements via crafted (1) IGMPv2 or (2) IGMPv3 packets, aka Bug ID CSCug61691. The Cisco Nexus Series switches are data center switches. Adopt the Cisco Nexus OS operating system. The Cisco NX-OS Nexus 1000V has security vulnerabilities. Because the access control list lacks support for IGMPv2 and IGMPv3, remote attackers can send IGMPv2 and IGMPv3 communications to bypass the 'deny' statement in the access control list. An attacker can exploit these issues to bypass certain security restrictions. This may aid in further attacks. These issues are being tracked by Cisco BugID CSCug61691. The software provides Cisco Catalyst switch functions such as QoS, ACL and SPAN in a VMware virtualized environment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201405-0171",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nexus 1000v intercloud",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "5.2\\(1\\)ic1\\(1.2\\)"
},
{
"model": "nexus 1000v intercloud",
"scope": "lte",
"trust": 0.8,
"vendor": "cisco",
"version": "5.2(1)ic1(1.2)"
},
{
"model": "nexus intercloud 5.2 ic1",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "1000v"
},
{
"model": "nexus 1000v intercloud",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "5.2\\(1\\)ic1\\(1.2\\)"
},
{
"model": "nexus intercloud for vmware",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "1000v0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"db": "BID",
"id": "67213"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-094"
},
{
"db": "NVD",
"id": "CVE-2014-0685"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:cisco:cisco_nexus_1000v_intercloud",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "67213"
}
],
"trust": 0.3
},
"cve": "CVE-2014-0685",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2014-0685",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-02911",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-68178",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-0685",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2014-0685",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2014-02911",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201405-094",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-68178",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"db": "VULHUB",
"id": "VHN-68178"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-094"
},
{
"db": "NVD",
"id": "CVE-2014-0685"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Nexus 1000V InterCloud 5.2(1)IC1(1.2) and earlier for VMware allows remote attackers to bypass ACL deny statements via crafted (1) IGMPv2 or (2) IGMPv3 packets, aka Bug ID CSCug61691. The Cisco Nexus Series switches are data center switches. Adopt the Cisco Nexus OS operating system. The Cisco NX-OS Nexus 1000V has security vulnerabilities. Because the access control list lacks support for IGMPv2 and IGMPv3, remote attackers can send IGMPv2 and IGMPv3 communications to bypass the \u0027deny\u0027 statement in the access control list. \nAn attacker can exploit these issues to bypass certain security restrictions. This may aid in further attacks. \nThese issues are being tracked by Cisco BugID CSCug61691. The software provides Cisco Catalyst switch functions such as QoS, ACL and SPAN in a VMware virtualized environment",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0685"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"db": "BID",
"id": "67213"
},
{
"db": "VULHUB",
"id": "VHN-68178"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-0685",
"trust": 3.4
},
{
"db": "BID",
"id": "67213",
"trust": 1.0
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201405-094",
"trust": 0.7
},
{
"db": "OSVDB",
"id": "106666",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2014-02911",
"trust": 0.6
},
{
"db": "CISCO",
"id": "20140505 CISCO NEXUS 1000V ACCESS CONTROL LIST BYPASS VULNERABILITY",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-68178",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"db": "VULHUB",
"id": "VHN-68178"
},
{
"db": "BID",
"id": "67213"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-094"
},
{
"db": "NVD",
"id": "CVE-2014-0685"
}
]
},
"id": "VAR-201405-0171",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"db": "VULHUB",
"id": "VHN-68178"
}
],
"trust": 0.06999999999999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02911"
}
]
},
"last_update_date": "2025-04-13T23:18:22.947000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Cisco Nexus 1000V Access Control List Bypass Vulnerability",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0685"
},
{
"title": "34130",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34130"
},
{
"title": "Cisco Nexus 1000V IGMPv2/IGMPv3 Access Control Patch for Defective Security Bypass Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/45482"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-68178"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"db": "NVD",
"id": "CVE-2014-0685"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2014-0685"
},
{
"trust": 1.7,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=34130"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0685"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0685"
},
{
"trust": 0.6,
"url": "http://osvdb.com/show/osvdb/106666"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"db": "VULHUB",
"id": "VHN-68178"
},
{
"db": "BID",
"id": "67213"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-094"
},
{
"db": "NVD",
"id": "CVE-2014-0685"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"db": "VULHUB",
"id": "VHN-68178"
},
{
"db": "BID",
"id": "67213"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"db": "CNNVD",
"id": "CNNVD-201405-094"
},
{
"db": "NVD",
"id": "CVE-2014-0685"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-05-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"date": "2014-05-07T00:00:00",
"db": "VULHUB",
"id": "VHN-68178"
},
{
"date": "2014-05-05T00:00:00",
"db": "BID",
"id": "67213"
},
{
"date": "2014-05-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"date": "2014-05-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-094"
},
{
"date": "2014-05-07T10:55:04.727000",
"db": "NVD",
"id": "CVE-2014-0685"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-05-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-02911"
},
{
"date": "2014-05-07T00:00:00",
"db": "VULHUB",
"id": "VHN-68178"
},
{
"date": "2014-05-05T00:00:00",
"db": "BID",
"id": "67213"
},
{
"date": "2014-05-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-002407"
},
{
"date": "2014-05-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201405-094"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2014-0685"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-094"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "VMware for Cisco Nexus 1000V InterCloud In ACL Vulnerability that avoids rejection statements",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-002407"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201405-094"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.