Vulnerability Name:

CVE-2014-7998 (CCN-98692)

Assigned:2014-11-14
Published:2014-11-14
Updated:2017-09-08
Summary:Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509.
CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.7 Medium (CCN CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C)
4.2 Medium (CCN Temporal CVSS v2 Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-264
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2014-7998

Source: CCN
Type: Cisco Security Notice
Cisco Aironet EAP Debugging Denial of Service Vulnerability

Source: CISCO
Type: Vendor Advisory
20141114 Cisco Aironet EAP Debugging Denial of Service Vulnerability

Source: CCN
Type: BID-71102
Cisco Aironet Access Points CVE-2014-7998 Denial of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1031219

Source: XF
Type: UNKNOWN
ciscoios-eap-cve20147998-dos(98692)

Source: XF
Type: UNKNOWN
ciscoios-eap-cve20147998-dos(98692)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:cisco:aironet_1040:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_1140:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_1260:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_3500:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_3600:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_3600e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_3600i:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_3600p:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap340:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap350:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:cisco:ios:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco ios -
    cisco aironet 1040 -
    cisco aironet 1140 -
    cisco aironet 1260 -
    cisco aironet 3500 -
    cisco aironet 3600 -
    cisco aironet 3600e -
    cisco aironet 3600i -
    cisco aironet 3600p -
    cisco aironet 600 office extend -
    cisco aironet ap1100 *
    cisco aironet ap1130ag *
    cisco aironet ap1131 *
    cisco aironet ap1200 *
    cisco aironet ap1230ag *
    cisco aironet ap1240 *
    cisco aironet ap1240ag *
    cisco aironet ap1300 *
    cisco aironet ap1400 *
    cisco aironet ap340 *
    cisco aironet ap340 11.21
    cisco aironet ap350 *
    cisco aironet ap350 11.21
    cisco ios *