CVE-2014-6278

GNU

EPSS 90.5%KEV
  • Vendors: GNU

🛡️ Vulnerability overview CVE-2014-6278

This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 ; https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23467 ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash ; https://www.ibm.com/support/pages/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https://nvd.nist.gov/vuln/detail/CVE-2014-6278

📊 Technical details

  • Severity:
  • CVSS:
  • Vendor:

🧩 Affected products

  • Not specified.
  • Update to the latest available version
  • Monitor logs and network traffic
  • Apply least-privilege and segment the network

🔗 References

  • No related CVEs.

Subscribe for CVE alerts

This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 ; https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23467 ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash ; https://www.ibm.com/support/pages/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https://nvd.nist.gov/vuln/detail/CVE-2014-6278

Related CVE by CWE

No related CWE found.

Top CVE for Vendor

  1. CVE-1999-0035 (CVSS 5.4)
  2. CVE-1999-0017 (no score)
  3. CVE-1999-0402 (no score)
  4. CVE-1999-0491 (no score)
  5. CVE-1999-1165 (no score)
  6. CVE-1999-1383 (no score)
  7. CVE-1999-0719 (no score)
  8. CVE-1999-0041 (no score)
  9. CVE-2000-0151 (no score)
  10. CVE-1999-0612 (no score)

Recently Exploited Similar Vulnerabilities

No recent KEV-listed items for this vendor/product.

How to fix CVE-2014-6278

CVE-2014-6278 is a unknown severity vulnerability affecting GNU the affected product.

Description: 🛡️ Vulnerability overview CVE-2014-6278 This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 ; https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23467 ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash ; https://www.ibm.com/support/pages/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https://nvd.nist.gov/vuln/detail/CVE-2014-6278 📊 Technical details Severity: CVSS: Vendor: 🧩 Affected products Not specified. 🚨 Recommended mitigations Update to the […]

Exploit Difficulty: HARD
⏱️ Time to exploit: > 4 hours
🛠️ Required skills: Advanced security expertise
💰 Public exploits: Rare or not public

How to Fix:

1 Identify affected systems

- Check if you're running the affected product

2 Immediate actions

- Update to the latest patched version
- If patching is not immediately possible: restrict network exposure, apply least-privilege access

3 Verification

- Test the fix in a staging environment first
- Review logs for signs of exploitation
- Monitor for IOCs (Indicators of Compromise)

4 Long-term prevention

- Enable automatic security updates
- Set up vulnerability monitoring
- Review and harden security configurations

Vendor Advisory: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027

Exploit Difficulty Assessment

HARD
⏱️ Time to Exploit: > 4 hours
🛠️ Skills Required: Advanced security expertise
💰 Public Exploits: Rare or not public
🚨 KEV Status: This vulnerability is actively exploited in the wild!

Vulnerability Timeline

Timeline information not available for this CVE.

Detection Rules & IOCs

No specific detection rules generated for this vulnerability type.

GNU