Vulnerability Description
The Locator/ID Separation Protocol (LISP) implementation in Cisco IOS 15.3(3)S and earlier and IOS XE does not properly validate parameters in ITR control messages, which allows remote attackers to cause a denial of service (CEF outage and packet drops) via malformed messages, aka Bug ID CSCun73782.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios | <= 15.3\(3\)s |
| Cisco | Ios Xe | - |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3262Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=34233Vendor Advisory
- http://www.securitytracker.com/id/1030243Third Party AdvisoryVDB Entry
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3262Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=34233Vendor Advisory
- http://www.securitytracker.com/id/1030243Third Party AdvisoryVDB Entry
FAQ
What is CVE-2014-3262?
CVE-2014-3262 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Locator/ID Separation Protocol (LISP) implementation in Cisco IOS 15.3(3)S and earlier and IOS XE does not properly validate parameters in ITR control messages, which allows remote attackers to ca...
How severe is CVE-2014-3262?
CVE-2014-3262 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3262?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios, Cisco Ios Xe.