cnvd-2015-03660
Vulnerability from cnvd
Title
Beckwith Electric TCP不正确生成TCP ISN值安全绕过漏洞
Description
Beckwith Electric是美国的变压设备。 多款Beckwith Electric产品中存在安全绕过漏洞,由于程序未能正确生成TCP initial sequence number(ISN)值,允许远程攻击者利用漏洞预测ISN值伪造TCP会话。
Severity
Patch Name
Beckwith Electric TCP不正确生成TCP ISN值安全绕过漏洞的补丁
Patch Description
Beckwith Electric是美国的变压设备。 多款Beckwith Electric产品中存在安全绕过漏洞,由于程序未能正确生成TCP initial sequence number(ISN)值,允许远程攻击者利用漏洞预测ISN值伪造TCP会话。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下厂商提供的安全补丁以修复该漏洞: http://www.becoconnect.com

Reference
https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01
Impacted products
Name
['Beckwith Electric M-6200 Digital Voltage Regulator Contro < D‑0198V04.07.00', 'Beckwith Electric M-6200A Digital Voltage Regulator Control < D‑0228V02.01.07', 'Beckwith Electric M-2001D Digital Tapchanger Control < D-0214V01.10.04', 'Beckwith Electric M-6283A Three Phase Digital Capacitor Bank Control < D-0346V03.00.02', 'Beckwith Electric M-6280A Digital Capacitor Bank Control < D‑0254V03.05.05', 'Beckwith Electric M-6280 Digital Capacitor Bank Control']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "74970"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2014-9201"
    }
  },
  "description": "Beckwith Electric\u662f\u7f8e\u56fd\u7684\u53d8\u538b\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3eBeckwith Electric\u4ea7\u54c1\u4e2d\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u7531\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u751f\u6210TCP initial sequence number(ISN)\u503c\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u9884\u6d4bISN\u503c\u4f2a\u9020TCP\u4f1a\u8bdd\u3002",
  "discovererName": "Raheem Beyah, David Formby, and San Shin Jung of Georgia Tech.",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://www.becoconnect.com",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2015-03660",
  "openTime": "2015-06-10",
  "patchDescription": "Beckwith Electric\u662f\u7f8e\u56fd\u7684\u53d8\u538b\u8bbe\u5907\u3002\r\n\r\n\u591a\u6b3eBeckwith Electric\u4ea7\u54c1\u4e2d\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u7531\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u751f\u6210TCP initial sequence number(ISN)\u503c\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u9884\u6d4bISN\u503c\u4f2a\u9020TCP\u4f1a\u8bdd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Beckwith Electric TCP\u4e0d\u6b63\u786e\u751f\u6210TCP ISN\u503c\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Beckwith Electric M-6200 Digital Voltage Regulator Contro \u003c D\u20110198V04.07.00",
      "Beckwith Electric M-6200A Digital Voltage Regulator Control \u003c D\u20110228V02.01.07",
      "Beckwith Electric M-2001D Digital Tapchanger Control \u003c D-0214V01.10.04",
      "Beckwith Electric M-6283A Three Phase Digital Capacitor Bank Control \u003c D-0346V03.00.02",
      "Beckwith Electric M-6280A Digital Capacitor Bank Control \u003c D\u20110254V03.05.05",
      "Beckwith Electric M-6280 Digital Capacitor Bank Control"
    ]
  },
  "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01",
  "serverity": "\u4e2d",
  "submitTime": "2015-06-07",
  "title": "Beckwith Electric TCP\u4e0d\u6b63\u786e\u751f\u6210TCP ISN\u503c\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…