CVE-2014-6271
criticalCVSS v3 Base Score
9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score
94.2%
Exploitation probability in 30 days
Top 0% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
High
Availability
High
Published: September 24, 2014 (4249 days ago)
Last Modified: April 22, 2026
Vendor: Check Point
Source: NVD
⚠️ CISA Known Exploited Vulnerability
Added to KEV: 2022-01-28
Remediation Due: 2022-07-28 (⚠ 1386d overdue)
Vulnerability Report
Generated by CyberWatcher
Description
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
CWE
CWE-78Affected Products
gnu basharista eosoracle linuxqnap qtsmageia mageiaredhat gluster storage server for on-premiseredhat virtualizationredhat enterprise linuxredhat enterprise linux desktopredhat enterprise linux eus