ID CVE-2014-9196
Summary Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
References
Vulnerable Configurations
  • cpe:2.3:a:eaton:proview:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:eaton:proview:5.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:eaton:proview:5.0.10:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 28-11-2016 - 19:13)
Impact:
Exploitability:
CWE CWE-254
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 75936
misc https://ics-cert.us-cert.gov/advisories/ICSA-15-006-01
Last major update 28-11-2016 - 19:13
Published 20-07-2015 - 01:59
Last modified 28-11-2016 - 19:13
Back to Top