Vulnerability Details : CVE-2014-7203
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
Exploit prediction scoring system (EPSS) score for CVE-2014-7203
Probability of exploitation activity in the next 30 days: 0.24%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 62 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-7203
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
References for CVE-2014-7203
-
https://github.com/zeromq/libzmq/pull/1189
Problem: curve messages can be replayed by steamraven · Pull Request #1189 · zeromq/libzmq · GitHub
-
http://lists.opensuse.org/opensuse-updates/2014-11/msg00027.html
openSUSE-SU-2014:1381-1: moderate: zeromq
-
http://seclists.org/oss-sec/2014/q3/754
oss-sec: CVE request: zeromq
-
https://github.com/zeromq/libzmq/issues/1191
Problem: CurveZMQ does not mandate replay attack detection · Issue #1191 · zeromq/libzmq · GitHub
-
http://secunia.com/advisories/62262
Sign in
-
http://www.securityfocus.com/bid/70157
ZeroMQ Multiple Security Bypass Vulnerabilities
-
http://seclists.org/oss-sec/2014/q3/776
oss-sec: Re: CVE request: zeromq
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/96242
ZeroMQ connection nonces replay attack CVE-2014-7203 Vulnerability Report
-
http://lists.opensuse.org/opensuse-updates/2014-11/msg00101.html
openSUSE-SU-2014:1493-1: moderate: Security update for zeromq
Products affected by CVE-2014-7203
- cpe:2.3:a:zeromq:zeromq:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:zeromq:zeromq:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:zeromq:zeromq:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:zeromq:zeromq:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:zeromq:zeromq:4.0.3:*:*:*:*:*:*:*