{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"WIO DH2 Wireless Gateway","vendor":"OleumTech","versions":[{"status":"affected","version":"All versions"}]},{"defaultStatus":"unaffected","product":"Sensor Wireless I/O Modules","vendor":"OleumTech","versions":[{"status":"affected","version":"All versions"}]}],"credits":[{"lang":"en","type":"finder","value":"Lucas Apa and Carlos Mario Penagos Hollman of IOActive"}],"datePublic":"2014-07-21T06:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>\nOleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.\n\n</p>"}],"value":"OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode."}],"metrics":[{"cvssV2_0":{"accessComplexity":"LOW","accessVector":"LOCAL","authentication":"NONE","availabilityImpact":"COMPLETE","baseScore":7.2,"confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","version":"2.0"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-320","description":"CWE-320","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2025-10-06T17:31:55.409Z"},"references":[{"name":"68797","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/68797"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-202-01a"},{"url":"http://support.oleumtech.com/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"OleumTech has created updates for both BreeZ and the gateway to mitigate\n all these vulnerabilities. These updates allow users to encrypt their \nwireless traffic with AES256. To obtain these updates, please log in to \nthe OleumTech download center (<a target=\"_blank\" rel=\"nofollow\" href=\"http://support.oleumtech.com/\">http://support.oleumtech.com/</a>&nbsp;) or contact OleumTech tech support:<p>Phone: 866-508-8586</p>\n<p>Email: <a target=\"_blank\" rel=\"nofollow\">TechSupport@OleumTech.com</a></p>"}],"value":"OleumTech has created updates for both BreeZ and the gateway to mitigate\n all these vulnerabilities. These updates allow users to encrypt their \nwireless traffic with AES256. To obtain these updates, please log in to \nthe OleumTech download center ( http://support.oleumtech.com/  ) or contact OleumTech tech support:Phone: 866-508-8586\n\n\nEmail: TechSupport@OleumTech.com"}],"source":{"advisory":"ICSA-14-202-01","discovery":"EXTERNAL"},"title":"OleumTech WIO Family Key Management Errors","x_generator":{"engine":"Vulnogram 0.2.0"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2014-2360","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"68797","refsource":"BID","url":"http://www.securityfocus.com/bid/68797"},{"name":"http://ics-cert.us-cert.gov/advisories/ICSA-14-202-01","refsource":"MISC","url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-202-01"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T10:14:25.421Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-202-01"},{"name":"68795","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/68795"}]}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2014-2361","datePublished":"2014-07-24T14:00:00.000Z","dateReserved":"2014-03-13T00:00:00.000Z","dateUpdated":"2025-10-06T17:31:55.409Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}