Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2014-7169 is a critical severity vulnerability with a CVSS score of 9.8. Exploits are available; patches have been released and should be applied urgently. This is classified as a zero-day vulnerability.
Very high probability of exploitation in the next 30 days
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
| Vendor | Product |
|---|---|
| IBM | Qradar Security Information And Event Manager |
| Redhat | Enterprise Linux For IBM Z Systems |
| IBM | Qradar Vulnerability Manager |
| IBM | Security Access Manager For Mobile 8.0 Firmware |
| Opensuse | Opensuse |
| VMware | Esx |
| F5 | Big IP Local Traffic Manager |
| F5 | Big IP Protocol Security Module |
| Redhat | Enterprise Linux Server Aus |
| VMware | Vcenter Server Appliance |
And 75 more...
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.