10.0
CRITICAL
CVE-2014-7249
Allied Telesis CentreCOM Rapier SwitchBlade Buffer Overflow
Description

Buffer overflow on the Allied Telesis AR440S, AR441S, AR442S, AR745, AR750S, AR750S-DP, AT-8624POE, AT-8624T/2M, AT-8648T/2SP, AT-8748XL, AT-8848, AT-9816GB, AT-9924T, AT-9924Ts, CentreCOM AR415S, CentreCOM AR450S, CentreCOM AR550S, CentreCOM AR570S, CentreCOM 8700SL, CentreCOM 8948XL, CentreCOM 9924SP, CentreCOM 9924T/4SP, Rapier 48i, and SwitchBlade4000 with firmware before 2.9.1-21 allows remote attackers to execute arbitrary code via a crafted HTTP POST request.

INFO

Published Date :

Dec. 19, 2014, 11:59 a.m.

Last Modified :

Dec. 19, 2014, 5:13 p.m.

Remotely Exploitable :

Yes !

Impact Score :

10.0

Exploitability Score :

10.0
Affected Products

The following products are affected by CVE-2014-7249 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Alliedtelesis centrecom_ar415s_firmware
2 Alliedtelesis centrecom_ar415s
3 Alliedtelesis at-8624t\/2m_firmware
4 Alliedtelesis at-8624t\/2m
5 Alliedtelesis ar442s_firmware
6 Alliedtelesis ar442s
7 Alliedtelesis at-9924t_firmware
8 Alliedtelesis at-9924t
9 Alliedtelesis at-8848_firmware
10 Alliedtelesis at-8848
11 Alliedtelesis rapier_48i_firmware
12 Alliedtelesis rapier_48i
13 Alliedtelesis centrecom_ar450s_firmware
14 Alliedtelesis centrecom_ar450s
15 Alliedtelesis ar745_firmware
16 Alliedtelesis ar745
17 Alliedtelesis ar441s_firmware
18 Alliedtelesis ar441s
19 Alliedtelesis centrecom_9924sp_firmware
20 Alliedtelesis centrecom_9924sp
21 Alliedtelesis switchblade4000_firmware
22 Alliedtelesis switchblade4000
23 Alliedtelesis at-8624poe_firmware
24 Alliedtelesis at-8624poe
25 Alliedtelesis centrecom_9924t\/4sp_firmware
26 Alliedtelesis centrecom_9924t\/4sp
27 Alliedtelesis at-9816gb_firmware
28 Alliedtelesis at-9816gb
29 Alliedtelesis at-9924ts_firmware
30 Alliedtelesis at-9924ts
31 Alliedtelesis ar750s_firmware
32 Alliedtelesis ar750s
33 Alliedtelesis centrecom_ar570s_firmware
34 Alliedtelesis centrecom_ar570s
35 Alliedtelesis centrecom_8948xl_firmware
36 Alliedtelesis centrecom_8948xl
37 Alliedtelesis at-8648t\/2sp_firmware
38 Alliedtelesis at-8648t\/2sp
39 Alliedtelesis centrecom_8700sl_firmware
40 Alliedtelesis centrecom_ar8700sl
41 Alliedtelesis ar750s-dp_firmware
42 Alliedtelesis ar750s-dp
43 Alliedtelesis centrecom_ar550s_firmware
44 Alliedtelesis centrecom_ar550s
45 Alliedtelesis at-8748xl_firmware
46 Alliedtelesis at-8748xl
47 Alliedtelesis ar440s_firmware
48 Alliedtelesis ar440s
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2014-7249.

URL Resource
http://jvn.jp/en/jp/JVN22440986/index.html Vendor Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000132 Vendor Advisory
http://www.allied-telesis.co.jp/support/list/faq/vuls/20141111aen.html Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2014-7249 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2014-7249 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Dec. 19, 2014

    Action Type Old Value New Value
    Added CPE Configuration Configuration 1 AND OR *cpe:2.3:o:alliedtelesis:centrecom_ar415s_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:centrecom_ar415s:*:*:*:*:*:*:*:* Configuration 2 AND OR *cpe:2.3:o:alliedtelesis:at-8624t\/2m_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:at-8624t\/2m:*:*:*:*:*:*:*:* Configuration 3 AND OR *cpe:2.3:o:alliedtelesis:ar442s_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:ar442s:-:*:*:*:*:*:*:* Configuration 4 AND OR *cpe:2.3:o:alliedtelesis:at-9924t_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:at-9924t:*:*:*:*:*:*:*:* Configuration 5 AND OR *cpe:2.3:o:alliedtelesis:at-8848_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:at-8848:*:*:*:*:*:*:*:* Configuration 6 AND OR *cpe:2.3:o:alliedtelesis:rapier_48i_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:rapier_48i:*:*:*:*:*:*:*:* Configuration 7 AND OR *cpe:2.3:o:alliedtelesis:centrecom_ar450s_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:centrecom_ar450s:*:*:*:*:*:*:*:* Configuration 8 AND OR *cpe:2.3:o:alliedtelesis:ar745_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:ar745:-:*:*:*:*:*:*:* Configuration 9 AND OR *cpe:2.3:o:alliedtelesis:ar441s_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:ar441s:-:*:*:*:*:*:*:* Configuration 10 AND OR *cpe:2.3:o:alliedtelesis:centrecom_9924sp_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:centrecom_9924sp:*:*:*:*:*:*:*:* Configuration 11 AND OR *cpe:2.3:o:alliedtelesis:switchblade4000_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:switchblade4000:*:*:*:*:*:*:*:* Configuration 12 AND OR *cpe:2.3:o:alliedtelesis:at-8624poe_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:at-8624poe:*:*:*:*:*:*:*:* Configuration 13 AND OR *cpe:2.3:o:alliedtelesis:centrecom_9924t\/4sp_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:centrecom_9924t\/4sp:*:*:*:*:*:*:*:* Configuration 14 AND OR *cpe:2.3:o:alliedtelesis:at-9816gb_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:at-9816gb:*:*:*:*:*:*:*:* Configuration 15 AND OR *cpe:2.3:o:alliedtelesis:at-9924ts_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:at-9924ts:*:*:*:*:*:*:*:* Configuration 16 AND OR *cpe:2.3:o:alliedtelesis:ar750s_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:ar750s:-:*:*:*:*:*:*:* Configuration 17 AND OR *cpe:2.3:o:alliedtelesis:centrecom_ar570s_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:centrecom_ar570s:*:*:*:*:*:*:*:* Configuration 18 AND OR *cpe:2.3:o:alliedtelesis:centrecom_8948xl_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:centrecom_8948xl:*:*:*:*:*:*:*:* Configuration 19 AND OR *cpe:2.3:o:alliedtelesis:at-8648t\/2sp_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:at-8648t\/2sp:*:*:*:*:*:*:*:* Configuration 20 AND OR *cpe:2.3:o:alliedtelesis:centrecom_8700sl_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:centrecom_ar8700sl:*:*:*:*:*:*:*:* Configuration 21 AND OR *cpe:2.3:o:alliedtelesis:ar750s-dp_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:ar750s-dp:-:*:*:*:*:*:*:* Configuration 22 AND OR *cpe:2.3:o:alliedtelesis:centrecom_ar550s_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:centrecom_ar550s:*:*:*:*:*:*:*:* Configuration 23 AND OR *cpe:2.3:o:alliedtelesis:at-8748xl_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:at-8748xl:*:*:*:*:*:*:*:* Configuration 24 AND OR *cpe:2.3:o:alliedtelesis:ar440s_firmware:2.9.1-20:*:*:*:*:*:*:* (and previous) OR *cpe:2.3:h:alliedtelesis:ar440s:-:*:*:*:*:*:*:*
    Added CVSS V2 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
    Changed Reference Type http://www.allied-telesis.co.jp/support/list/faq/vuls/20141111aen.html No Types Assigned http://www.allied-telesis.co.jp/support/list/faq/vuls/20141111aen.html Advisory
    Changed Reference Type http://jvndb.jvn.jp/jvndb/JVNDB-2014-000132 No Types Assigned http://jvndb.jvn.jp/jvndb/JVNDB-2014-000132 Advisory
    Changed Reference Type http://jvn.jp/en/jp/JVN22440986/index.html No Types Assigned http://jvn.jp/en/jp/JVN22440986/index.html Advisory
    Added CWE CWE-119
  • Initial Analysis by [email protected]

    Dec. 19, 2014

    Action Type Old Value New Value
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

1.32 }} 0.01%

score

0.84526

percentile

CVSS2 - Vulnerability Scoring System
Access Vector
Access Complexity
Authentication
Confidentiality
Integrity
Availability