Vulnslist

find the latest Cisco vulnerabilities

Cisco Packet Data Network Gateway Denial of Service Vulnerability

Cisco-SA-20140819-CVE-2014-3331 · Medium · Published · Updated

A vulnerability in the Session Manager software of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to cause the Session Manager to crash. The issue is due to insufficient validation of received TCP packets. An attacker could exploit this issue by sending a crafted TCP packet. An exploit could allow the attacker to cause the Session Manager process to crash. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker may need access to trusted, internal networks behind a firewall to send crafted TCP packets to the targeted device. This access requirement may reduce the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators can help protect affected systems from external attacks by using a solid firewall strategy.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-3331
Cisco Bug IDsCSCuo21914
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:N/I:N/A:P/E:F/RL:OF/RC:C
Product Names From Source
Cisco ASR 5000 Series Software

Related Products

Product CVE Evidence
Cisco ASR 5000 Series Software CVE-2014-3331 Cisco OpenVuln