5
CVSSv2

CVE-2014-7992

Published: 18/11/2014 Updated: 08/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The DLSw implementation in Cisco IOS does not initialize packet buffers, which allows remote malicious users to obtain sensitive credential information from process memory via a session on TCP port 2067, aka Bug ID CSCur14014.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios -

Vendor Advisories

A vulnerability in the DLSw feature of Cisco IOS could allow an unauthenticated, remote attacker to extract information from previously processed packets The vulnerability is due to the lack of initialization of packet buffers An attacker could exploit this vulnerability by connecting to the DLSw port (TCP/2067) An exploit could allow the attac ...

Github Repositories

cisco dlsw exploit

DLSW Exploit Cisco DLSw Information Disclosure Vulnerability There is a bug in Cisco's DLSw implementation affecting 12x and 15x trains that allows an unuthenticated remote attacker to retrieve the partial contents of packets traversing a Cisco router with DLSw configured and active Vulnerability discovered by: - Tate Hansen - John McLeod Kyle Rainey built lab to recrea

cisco dlsw exploit

DLSW Exploit Cisco DLSw Information Disclosure Vulnerability There is a bug in Cisco's DLSw implementation affecting 12x and 15x trains that allows an unuthenticated remote attacker to retrieve the partial contents of packets traversing a Cisco router with DLSw configured and active Vulnerability discovered by: - Tate Hansen - John McLeod Kyle Rainey built lab to recrea