⚠ Actively exploited
Added to CISA KEV on 2025-10-02. Federal agencies required to patch by 2025-10-23. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. .
CVE-2014-6278
Severity
8.8HIGH
EPSS
90.1%
top 0.41%
CISA KEV
KEV
Added 2025-10-02
Due 2025-10-23
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 30
KEV addedOct 2
KEV dueOct 23
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. N…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
6Exploit-DB▶
Sun Secure Global Desktop and Oracle Global Desktop 4.61.915 - Command Injection (Shellshock)↗2016-06-06
📋Vendor Advisories
5Red Hat
▶
Debian▶
CVE-2014-6278: bash - GNU Bash through 4.3 bash43-026 does not properly parse function definitions in ...↗2014
💬Community
1Bugzilla▶
CVE-2014-6278 bash: incorrect parsing of function definitions with nested command substitutions↗2014-09-29