7.6

CVE-2014-2378

Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not verify the integrity of downloaded updates, which allows remote attackers to execute arbitrary code via a Trojan horse update.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SensysnetworksTrafficdot Version <= 2.10.2
SensysnetworksTrafficdot Version2.8.3
SensysnetworksTrafficdot Version2.10.0
SensysnetworksTrafficdot Version2.10.1
SensysnetworksVsn240-f Version-
SensysnetworksVsn240-t Version-
SensysnetworksVds Version <= 2.10.0
SensysnetworksVds Version1.8.5
SensysnetworksVds Version1.8.7
SensysnetworksVds Version2.6.3
SensysnetworksVds Version2.6.4
SensysnetworksVsn240-f Version-
SensysnetworksVsn240-t Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.19% 0.41
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.6 5.5 9.5
AV:A/AC:M/Au:N/C:C/I:C/A:P
ics-cert@hq.dhs.gov 6.5 3.2 9.5
AV:A/AC:H/Au:N/C:C/I:C/A:P
CWE-494 Download of Code Without Integrity Check

The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.

CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.