Cisco IOS XR OpenSSL Security Bypass (CSCup22654)

Medium Nessus Plugin ID 88990

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 8.5


The remote device is missing a vendor-supplied security patch.


The remote Cisco device is running a version of IOS XR software that is affected by security bypass vulnerability in the bundled OpenSSL library due to an unspecified error that can allow an attacker to cause the usage of weak keying material, leading to simplified man-in-the-middle attacks.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCup22654.

See Also

Plugin Details

Severity: Medium

ID: 88990

File Name: cisco-sa-20140605-openssl-iosxr.nasl

Version: 1.10

Type: local

Family: CISCO

Published: 2016/02/26

Updated: 2019/11/19

Dependencies: 71430

Risk Information

Risk Factor: Medium

VPR Score: 8.5

CVSS Score Source: CVE-2014-0224

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/06/05

Vulnerability Publication Date: 2014/06/03

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0224

BID: 67899

CERT: 978508


CISCO-SA: cisco-sa-20140605-openssl