Vulnerability Details : CVE-2014-3291
Cisco Wireless LAN Controller (WLC) devices allow remote attackers to cause a denial of service (NULL pointer dereference and device restart) via a zero value in Cisco Discovery Protocol packet data that is not properly handled during SNMP polling, aka Bug ID CSCuo12321.
Vulnerability category: Memory CorruptionInput validationDenial of service
Products affected by CVE-2014-3291
- cpe:2.3:h:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3291
0.51%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3291
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.7
|
MEDIUM | AV:A/AC:M/Au:N/C:N/I:N/A:C |
5.5
|
6.9
|
NIST |
CWE ids for CVE-2014-3291
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3291
-
http://www.securitytracker.com/id/1030410
Cisco Wireless LAN Controller CDP Processing Flaw Lets Remote Users Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/67926
Cisco Wireless LAN Controller CVE-2014-3291 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3291
Cisco Wireless LAN Controller Cisco Discovery Protocol Denial of Service VulnerabilityVendor Advisory
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=34558
Cisco Wireless LAN Controller Cisco Discovery Protocol Denial of Service VulnerabilityVendor Advisory
Jump to