{"api_version":"1","generated_at":"2026-04-23T02:35:11+00:00","cve":"CVE-2014-3251","urls":{"html":"https://cve.report/CVE-2014-3251","api":"https://cve.report/api/cve/CVE-2014-3251.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-3251","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-3251"},"summary":{"title":"CVE-2014-3251","description":"The MCollective aes_security plugin, as used in Puppet Enterprise before 3.3.0 and Mcollective before 2.5.3, does not properly validate new server certificates based on the CA certificate, which allows local users to establish unauthorized Mcollective connections via unspecified vectors related to a race condition.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2014-08-12 23:55:00","updated_at":"2019-07-10 18:10:00"},"problem_types":["CWE-362"],"metrics":[],"references":[{"url":"http://secunia.com/advisories/60066","name":"60066","refsource":"SECUNIA","tags":[],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59356","name":"59356","refsource":"SECUNIA","tags":[],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://puppetlabs.com/security/cve/cve-2014-3251","name":"http://puppetlabs.com/security/cve/cve-2014-3251","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"CVE-2014-3251 | Puppet Labs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/109257","name":"109257","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-3251","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3251","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"3251","vulnerable":"1","versionEndIncluding":"3.2.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"puppet","cpe5":"puppet_enterprise","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"puppetlabs","cpe5":"mcollective","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"3251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"puppetlabs","cpe5":"mcollective","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2014-3251","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The MCollective aes_security plugin, as used in Puppet Enterprise before 3.3.0 and Mcollective before 2.5.3, does not properly validate new server certificates based on the CA certificate, which allows local users to establish unauthorized Mcollective connections via unspecified vectors related to a race condition."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"109257","refsource":"OSVDB","url":"http://www.osvdb.org/109257"},{"name":"http://puppetlabs.com/security/cve/cve-2014-3251","refsource":"CONFIRM","url":"http://puppetlabs.com/security/cve/cve-2014-3251"},{"name":"60066","refsource":"SECUNIA","url":"http://secunia.com/advisories/60066"},{"name":"59356","refsource":"SECUNIA","url":"http://secunia.com/advisories/59356"}]}},"nvd":{"publishedDate":"2014-08-12 23:55:00","lastModifiedDate":"2019-07-10 18:10:00","problem_types":["CWE-362"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.4},"severity":"MEDIUM","exploitabilityScore":3.4,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:puppetlabs:mcollective:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"3251","Ordinal":"70202","Title":"CVE-2014-3251","CVE":"CVE-2014-3251","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"3251","Ordinal":"1","NoteData":"The MCollective aes_security plugin, as used in Puppet Enterprise before 3.3.0 and Mcollective before 2.5.3, does not properly validate new server certificates based on the CA certificate, which allows local users to establish unauthorized Mcollective connections via unspecified vectors related to a race condition.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"3251","Ordinal":"2","NoteData":"2014-08-12","Type":"Other","Title":"Published"},{"CveYear":"2014","CveId":"3251","Ordinal":"3","NoteData":"2017-11-14","Type":"Other","Title":"Modified"}]}}}