2.9
CVE-2014-6381
- EPSS 0.2%
- Published 12.12.2014 15:59:03
- Last modified 12.04.2025 10:46:40
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Juniper WLC devices with WLAN Software releases 8.0.x before 8.0.4, 9.0.x before 9.0.2.11, 9.0.3.x before 9.0.3.5, and 9.1.x before 9.1.1, when "Proxy ARP" or "No Broadcast" features are enabled in a clustered setup, allows remote attackers to cause a denial of service (device disconnect) via unspecified vectors.
Data is provided by the National Vulnerability Database (NVD)
Juniper ≫ Mobile System Software Version8.0
Juniper ≫ Mobile System Software Version8.0.2.2
Juniper ≫ Mobile System Software Version8.0.3.6
Juniper ≫ Mobile System Software Version9.0
Juniper ≫ Mobile System Software Version9.0.2.5
Juniper ≫ Mobile System Software Version9.1
Juniper ≫ Ringmaster Version8.0
Juniper ≫ Ringmaster Version8.0.2.1
Juniper ≫ Ringmaster Version8.0.3.2
Juniper ≫ Ringmaster Version9.0
Juniper ≫ Ringmaster Version9.0.2.1
Juniper ≫ Ringmaster Version9.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.2% | 0.396 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 2.9 | 5.5 | 2.9 |
AV:A/AC:M/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.