Bash “Shellshock” vulnerability
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2014-001 | CVE-2014-6271 | 09/25/2014 | medium | v1 |
Vulnerability details
A vulnerability has been disclosed in the bash command interpreter (CVE-2014-6271). Its exploitation could lead to a remote code execution on the targeted system.
Impacted products
Products | Severity | Detail |
---|---|---|
Fast360 | medium | The version of the bash interpreter on Fast360 appliances is vulnerable. At the time of writing, preliminary studies showed that this vulnerability may be exploited only with a non-standard configuration of the DHCP client (« cable interface » with arkoonconfig key "dhcp-client.get-dns-servers=yes"), with conditions different from the attacks available on Internet. However, due to the central role of bash, other non-identified vectors may be discovered allowing to exploit this vulnerability. A preventive update is scheduled for Fast360 as soon as possible. |
Revisions
Version | Date | Description |
---|---|---|
v1 | 09/25/2014 | Initial release |

Fast360 |
CVSS v2 Overall Score: 5.1
|
Analysis |
Impacted version |
The Fast360 products include a vulnerable version of the bash command interpreter. At the time of writing, this vulnerability may be exploited only with a non-standard configuration of the DHCP client (“Cable modem interface” with the arkoon-config key “dhcp-client.get-dnsservers=yes”). The attacker needs to access the physical link connected to the cable modem interface. Due to the central role of the bash interpreter, other non-identified attack vectors may be discovered. Consequently, preventive updates are available in Fast360 5.0/32 and 5.0/6 versions |
|
Workaround solution |
Solution |
Concerning the DHCP client exploitation, the following workaround can be applied:
|
Fast360 5.0/32 and Fast360 6.0/6 versions include a fix for this problem. We recommend you to update your version as soon as possible. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Local | High | None | Complete | Complete | Complete |
CVSS Base score: 6.2 | CVSS Vector: (AV:L/AC:H/Au:N/C:C/I:C/A:C) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Workaround | Unconfirmed |
CVSS Temporal score: 4.5 | CVSS Vector: (AV:L/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:W/RC:UC) |
Collateral Damage Potential | Target Distribution |
---|---|
Low | High [76-100%] |
CVSS Environmental score: 5.1 | CVSS Vector: (AV:L/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:W/RC:UC/CDP:L/TD:H/CR:ND/IR:ND/AR:ND) |
