ID

VAR-201409-0186


CVE

CVE-2014-2378


TITLE

Sensys Networks VSN240 Sensor VDS and TrafficDOT Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2014-004066

DESCRIPTION

Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not verify the integrity of downloaded updates, which allows remote attackers to execute arbitrary code via a Trojan horse update. Sensys Networks VSN240-F, VSN240-T sensors VDS and TrafficDOT are wireless traffic detection sensors from Sensys Networks, USA. Sensys Networks VSN240-F and VSN240-T sensors have security bypass vulnerabilities in versions prior to VDS 2.10.1 and versions prior to TrafficDOT 2.10.3. The program failed to verify the integrity of the download update. Multiple Sensys Networks Products are prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass security restrictions and cause the system to download the modified code without sufficiently verifying the integrity of the code; this may aid in launching further attacks

Trust: 2.43

sources: NVD: CVE-2014-2378 // JVNDB: JVNDB-2014-004066 // CNVD: CNVD-2014-05492 // BID: 69641

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-05492

AFFECTED PRODUCTS

vendor:sensysnetworksmodel:trafficdotscope:eqversion:2.10.1

Trust: 1.6

vendor:sensysnetworksmodel:vdsscope:eqversion:1.8.7

Trust: 1.6

vendor:sensysnetworksmodel:vdsscope:eqversion:2.6.4

Trust: 1.6

vendor:sensysnetworksmodel:trafficdotscope:eqversion:2.10.0

Trust: 1.6

vendor:sensysnetworksmodel:vdsscope:eqversion:1.8.5

Trust: 1.6

vendor:sensysnetworksmodel:trafficdotscope:eqversion:2.8.3

Trust: 1.6

vendor:sensysnetworksmodel:vdsscope:eqversion:2.6.3

Trust: 1.6

vendor:sensysmodel:vsn240-fscope: - version: -

Trust: 1.4

vendor:sensysmodel:trafficdotscope:ltversion:2.10.3

Trust: 1.4

vendor:sensysnetworksmodel:vsn240-tscope:eqversion: -

Trust: 1.0

vendor:sensysnetworksmodel:trafficdotscope:lteversion:2.10.2

Trust: 1.0

vendor:sensysnetworksmodel:vsn240-fscope:eqversion: -

Trust: 1.0

vendor:sensysnetworksmodel:vdsscope:lteversion:2.10.0

Trust: 1.0

vendor:sensysmodel:vdsscope:ltversion:2.10.1

Trust: 0.8

vendor:sensysmodel:vsn240-tscope: - version: -

Trust: 0.8

vendor:sensysmodel:vsn240-t sensors vdsscope:ltversion:2.10.1

Trust: 0.6

vendor:sensysnetworksmodel:trafficdotscope:eqversion:2.10.2

Trust: 0.6

vendor:sensysnetworksmodel:vdsscope:eqversion:2.10.0

Trust: 0.6

sources: CNVD: CNVD-2014-05492 // CNNVD: CNNVD-201409-051 // JVNDB: JVNDB-2014-004066 // NVD: CVE-2014-2378

CVSS

SEVERITY

CVSSV2

CVSSV3

ics-cert@hq.dhs.gov: CVE-2014-2378
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2014-2378
value: HIGH

Trust: 1.0

NVD: CVE-2014-2378
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-05492
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201409-051
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2014-2378
severity: HIGH
baseScore: 7.6
vectorString: AV:A/AC:M/AU:N/C:C/I:C/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ics-cert@hq.dhs.gov: CVE-2014-2378
severity: MEDIUM
baseScore: 6.5
vectorString: AV:A/AC:H/AU:N/C:C/I:C/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 3.2
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2014-05492
severity: MEDIUM
baseScore: 6.5
vectorString: AV:A/AC:H/AU:N/C:C/I:C/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 3.2
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2014-05492 // CNNVD: CNNVD-201409-051 // JVNDB: JVNDB-2014-004066 // NVD: CVE-2014-2378 // NVD: CVE-2014-2378

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

problemtype:CWE-494

Trust: 1.0

sources: JVNDB: JVNDB-2014-004066 // NVD: CVE-2014-2378

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201409-051

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201409-051

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004066

PATCH

title:Channel Partner Resources by Categoryurl:http://www.sensysnetworks.com/resources-by-category/

Trust: 0.8

title:Patches for multiple Sensys Networks product security bypass vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/49792

Trust: 0.6

sources: CNVD: CNVD-2014-05492 // JVNDB: JVNDB-2014-004066

EXTERNAL IDS

db:NVDid:CVE-2014-2378

Trust: 3.3

db:ICS CERTid:ICSA-14-247-01

Trust: 3.0

db:ICS CERTid:ICSA-14-247-01A

Trust: 1.0

db:BIDid:69641

Trust: 0.9

db:JVNDBid:JVNDB-2014-004066

Trust: 0.8

db:CNVDid:CNVD-2014-05492

Trust: 0.6

db:CNNVDid:CNNVD-201409-051

Trust: 0.6

sources: CNVD: CNVD-2014-05492 // BID: 69641 // CNNVD: CNNVD-201409-051 // JVNDB: JVNDB-2014-004066 // NVD: CVE-2014-2378

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-14-247-01

Trust: 3.0

url:https://www.cisa.gov/news-events/ics-advisories/icsa-14-247-01a

Trust: 1.0

url:http://www.sensysnetworks.com/resources-by-category/#sw

Trust: 1.0

url:http://www.sensysnetworks.com/distributors/

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2378

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2378

Trust: 0.8

url:http://www.securityfocus.com/bid/69641

Trust: 0.6

sources: CNVD: CNVD-2014-05492 // CNNVD: CNNVD-201409-051 // JVNDB: JVNDB-2014-004066 // NVD: CVE-2014-2378

CREDITS

Cesar Cerrudo of IOActive

Trust: 0.3

sources: BID: 69641

SOURCES

db:CNVDid:CNVD-2014-05492
db:BIDid:69641
db:CNNVDid:CNNVD-201409-051
db:JVNDBid:JVNDB-2014-004066
db:NVDid:CVE-2014-2378

LAST UPDATE DATE

2025-10-15T23:47:41.037000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-05492date:2014-09-10T00:00:00
db:BIDid:69641date:2014-10-30T01:58:00
db:CNNVDid:CNNVD-201409-051date:2014-09-09T00:00:00
db:JVNDBid:JVNDB-2014-004066date:2014-09-09T00:00:00
db:NVDid:CVE-2014-2378date:2025-10-13T23:15:35.360

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-05492date:2014-09-10T00:00:00
db:BIDid:69641date:2014-09-05T00:00:00
db:CNNVDid:CNNVD-201409-051date:2014-09-09T00:00:00
db:JVNDBid:JVNDB-2014-004066date:2014-09-09T00:00:00
db:NVDid:CVE-2014-2378date:2014-09-05T17:55:06.500