var-201409-0186
Vulnerability from variot

Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not verify the integrity of downloaded updates, which allows remote attackers to execute arbitrary code via a Trojan horse update. Sensys Networks VSN240-F, VSN240-T sensors VDS and TrafficDOT are wireless traffic detection sensors from Sensys Networks, USA. Sensys Networks VSN240-F and VSN240-T sensors have security bypass vulnerabilities in versions prior to VDS 2.10.1 and versions prior to TrafficDOT 2.10.3. The program failed to verify the integrity of the download update. Multiple Sensys Networks Products are prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass security restrictions and cause the system to download the modified code without sufficiently verifying the integrity of the code; this may aid in launching further attacks

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201409-0186",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "trafficdot",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sensysnetworks",
        "version": "2.10.1"
      },
      {
        "model": "vds",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sensysnetworks",
        "version": "1.8.7"
      },
      {
        "model": "vds",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sensysnetworks",
        "version": "2.6.4"
      },
      {
        "model": "trafficdot",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sensysnetworks",
        "version": "2.10.0"
      },
      {
        "model": "vds",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sensysnetworks",
        "version": "1.8.5"
      },
      {
        "model": "trafficdot",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sensysnetworks",
        "version": "2.8.3"
      },
      {
        "model": "vds",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sensysnetworks",
        "version": "2.6.3"
      },
      {
        "model": "vsn240-f",
        "scope": null,
        "trust": 1.4,
        "vendor": "sensys",
        "version": null
      },
      {
        "model": "trafficdot",
        "scope": "lt",
        "trust": 1.4,
        "vendor": "sensys",
        "version": "2.10.3"
      },
      {
        "model": "trafficdot",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sensysnetworks",
        "version": "2.10.2"
      },
      {
        "model": "vsn240-t",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sensysnetworks",
        "version": null
      },
      {
        "model": "vsn240-f",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sensysnetworks",
        "version": null
      },
      {
        "model": "vds",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sensysnetworks",
        "version": "2.10.0"
      },
      {
        "model": "vds",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "sensys",
        "version": "2.10.1"
      },
      {
        "model": "vsn240-t",
        "scope": null,
        "trust": 0.8,
        "vendor": "sensys",
        "version": null
      },
      {
        "model": "vsn240-t sensors vds",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "sensys",
        "version": "2.10.1"
      },
      {
        "model": "trafficdot",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sensysnetworks",
        "version": "2.10.2"
      },
      {
        "model": "vds",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sensysnetworks",
        "version": "2.10.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2378"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:sensysnetworks:trafficdot",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sensysnetworks:vds",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sensysnetworks:vsn240-f",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sensysnetworks:vsn240-t",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cesar Cerrudo of IOActive",
    "sources": [
      {
        "db": "BID",
        "id": "69641"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-2378",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 5.5,
            "id": "CVE-2014-2378",
            "impactScore": 9.5,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.2,
            "id": "CNVD-2014-05492",
            "impactScore": 9.5,
            "integrityImpact": "COMPLETE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-2378",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2014-2378",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-05492",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201409-051",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2378"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not verify the integrity of downloaded updates, which allows remote attackers to execute arbitrary code via a Trojan horse update. Sensys Networks VSN240-F, VSN240-T sensors VDS and TrafficDOT are wireless traffic detection sensors from Sensys Networks, USA. Sensys Networks VSN240-F and VSN240-T sensors have security bypass vulnerabilities in versions prior to VDS 2.10.1 and versions prior to TrafficDOT 2.10.3. The program failed to verify the integrity of the download update. Multiple Sensys Networks Products are prone to a security-bypass vulnerability. \nAttackers can exploit this issue to bypass security restrictions and cause the system to download the modified code without sufficiently verifying the integrity of the code; this may aid in launching further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "db": "BID",
        "id": "69641"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2378",
        "trust": 3.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-14-247-01",
        "trust": 3.0
      },
      {
        "db": "BID",
        "id": "69641",
        "trust": 0.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-051",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "db": "BID",
        "id": "69641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2378"
      }
    ]
  },
  "id": "VAR-201409-0186",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      }
    ],
    "trust": 1.3638889
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:02:03.004000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Channel Partner Resources by Category",
        "trust": 0.8,
        "url": "http://www.sensysnetworks.com/resources-by-category/"
      },
      {
        "title": "Patches for multiple Sensys Networks product security bypass vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/49792"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-94",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2378"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-14-247-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2378"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2378"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/69641"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2378"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "db": "BID",
        "id": "69641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2378"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-09-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "date": "2014-09-05T00:00:00",
        "db": "BID",
        "id": "69641"
      },
      {
        "date": "2014-09-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "date": "2014-09-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      },
      {
        "date": "2014-09-05T17:55:06.500000",
        "db": "NVD",
        "id": "CVE-2014-2378"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-09-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-05492"
      },
      {
        "date": "2014-10-30T01:58:00",
        "db": "BID",
        "id": "69641"
      },
      {
        "date": "2014-09-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      },
      {
        "date": "2014-09-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      },
      {
        "date": "2024-11-21T02:06:10.603000",
        "db": "NVD",
        "id": "CVE-2014-2378"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sensys Networks VSN240 Sensor  VDS and  TrafficDOT Vulnerable to arbitrary code execution",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004066"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201409-051"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…