{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"VSN240-F","vendor":"Sensys Networks","versions":[{"lessThan":"VDS 2.10.1","status":"affected","version":"0","versionType":"custom"},{"lessThan":"VDS 1.8.8","status":"affected","version":"0","versionType":"custom"},{"lessThan":"TrafficDOT 2.10.3","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"VSN240-T","vendor":"Sensys Networks","versions":[{"lessThan":"VDS 2.10.1","status":"affected","version":"0","versionType":"custom"},{"lessThan":"VDS 1.8.8","status":"affected","version":"0","versionType":"custom"},{"lessThan":"TrafficDOT 2.10.3","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Cesar Cerrudo of IOActive"}],"datePublic":"2014-09-04T06:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not use encryption, which allows remote attackers to interfere with traffic control by replaying transmissions on a wireless network."}],"value":"Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not use encryption, which allows remote attackers to interfere with traffic control by replaying transmissions on a wireless network."}],"metrics":[{"cvssV2_0":{"accessComplexity":"HIGH","accessVector":"ADJACENT_NETWORK","authentication":"NONE","availabilityImpact":"PARTIAL","baseScore":4.3,"confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","vectorString":"AV:A/AC:H/Au:N/C:P/I:P/A:P","version":"2.0"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-311","description":"CWE-311","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2025-10-13T23:02:57.689Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-247-01a"},{"url":"http://www.sensysnetworks.com/resources-by-category/#sw"},{"url":"http://www.sensysnetworks.com/distributors/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Sensys Networks has produced updated product versions VDS 2.10.1 and \nTrafficDOT 2.10.3 to remediate vulnerabilities identified in their \nVSN240-F and VSN240-T traffic sensors.<br></p>\n\n<p>Sensys Networks has released software update VDS 1.8.8, for an older \nmodel access point, to remediate traffic sensor vulnerabilities.</p>\n<p>The updated human-machine interface version, TrafficDOT 2.10.3, \nenables encrypted software downloads for sensors and sensor data \nauthentication for access points and access point controller cards using\n updated versions VDS 2.10.1 or VDS 1.8.8.<br></p>\n\n<p>Additional information about Sensys Networks’ software releases can be found at the following location:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://www.sensysnetworks.com/resources-by-category/#sw\">http://www.sensysnetworks.com/resources-by-category/#sw</a></p><p>Updated\n product versions are available through Sensys Networks’ local \ndistributors. Contact information for their local distributors can be \nfound at the following location:</p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http://www.sensysnetworks.com/distributors/\">http://www.sensysnetworks.com/distributors/</a></p>\n\n<br>"}],"value":"Sensys Networks has produced updated product versions VDS 2.10.1 and \nTrafficDOT 2.10.3 to remediate vulnerabilities identified in their \nVSN240-F and VSN240-T traffic sensors.\n\n\n\n\nSensys Networks has released software update VDS 1.8.8, for an older \nmodel access point, to remediate traffic sensor vulnerabilities.\n\n\nThe updated human-machine interface version, TrafficDOT 2.10.3, \nenables encrypted software downloads for sensors and sensor data \nauthentication for access points and access point controller cards using\n updated versions VDS 2.10.1 or VDS 1.8.8.\n\n\n\n\nAdditional information about Sensys Networks’ software releases can be found at the following location:\n\n\n http://www.sensysnetworks.com/resources-by-category/#sw \n\nUpdated\n product versions are available through Sensys Networks’ local \ndistributors. Contact information for their local distributors can be \nfound at the following location:\n\n\n http://www.sensysnetworks.com/distributors/"}],"source":{"advisory":"ICSA-14-247-01","discovery":"EXTERNAL"},"title":"Sensys Networks Traffic Sensor Missing Encryption of Sensitive Data","x_generator":{"engine":"Vulnogram 0.2.0"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2014-2378","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not verify the integrity of downloaded updates, which allows remote attackers to execute arbitrary code via a Trojan horse update."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-14-247-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-14-247-01"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T10:14:25.982Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-14-247-01"}]}]},"cveMetadata":{"assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","assignerShortName":"icscert","cveId":"CVE-2014-2379","datePublished":"2014-09-05T17:00:00.000Z","dateReserved":"2014-03-13T00:00:00.000Z","dateUpdated":"2025-10-13T23:02:57.689Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}