CVE-2014-9201 (GCVE-0-2014-9201)
Vulnerability from cvelistv5 – Published: 2015-06-05 10:00 – Updated: 2024-08-06 13:40
VLAI?
Summary
Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T13:40:24.594Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-06-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-06-05T04:57:00",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-9201",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2014-9201",
"datePublished": "2015-06-05T10:00:00",
"dateReserved": "2014-12-02T00:00:00",
"dateUpdated": "2024-08-06T13:40:24.594Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:beckwithelectric:m-2001d_digital_tapchanger_control:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5887C1B7-6F67-40BC-AD30-EDE2A41C927D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:beckwithelectric:m-6200_digital_voltage_regulator_control:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57F30CF8-8FCF-42D9-9B39-D959429ED769\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:beckwithelectric:m-6200a_digital_voltage_regulator_control:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7048ABB-7792-4D1C-9F41-0C43174A718B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:beckwithelectric:m-6280_digital_capacitor_bank_control:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"011AD704-1724-43CC-85EF-7AA1765EDB3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:beckwithelectric:m-6280a_digital_capacitor_bank_control:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3DA7C7D-85FB-47E6-9D20-FE4F53EAC4C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"286B76C5-6D03-4E70-985B-A1B60E86C6DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:beckwithelectric:m-2001d_digital_tapchanger_control_d-0214_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"01.10.04\", \"matchCriteriaId\": \"1031150D-C53C-4DF8-97C7-E3D41DF4C196\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:beckwithelectric:m-6200_digital_voltage_regulator_control_d-0198_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"04.07.00\", \"matchCriteriaId\": \"A5D190EA-400D-4624-A6EB-D0140DCA9D77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:beckwithelectric:m-6200a_digital_voltage_regulator_control_d-0228_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"02.01.07\", \"matchCriteriaId\": \"EE2F6366-C2DB-44C2-B389-371E34EAF9B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:beckwithelectric:m-6280_digital_capacitor_bank_control_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FB63219-FBE1-4F96-9272-E1A97456B601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:beckwithelectric:m-6280a_digital_capacitor_bank_control_d-0254_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"03.05.05\", \"matchCriteriaId\": \"21CF5B1A-A569-46FA-9CD3-0BFBE3FB61B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control_d-0346_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"03.00.02\", \"matchCriteriaId\": \"DE1B59AD-33D6-4901-B2C4-F6A7498BFA7B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.\"}, {\"lang\": \"es\", \"value\": \"Beckwith Electric M-6200 Digital Voltage Regulator Control con firmware anterior a D-0198V04.07.00, M-6200A Digital Voltage Regulator Control con firmware anterior a D-0228V02.01.07, M-2001D Digital Tapchanger Control con firmware anterior a D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control con firmware anterior a D-0346V03.00.02, M-6280A Digital Capacitor Bank Control con firmware anterior a D-0254V03.05.05, y M-6280 Digital Capacitor Bank Control no generan correctamente los valores de n\\u00fameros de secuencias iniciales (ISN) de TCP, lo que facilita a atacantes remotos falsificar sesiones de TCP mediante la predicci\\u00f3n de un valor ISN.\"}]",
"id": "CVE-2014-9201",
"lastModified": "2024-11-21T02:20:23.467",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:P\", \"baseScore\": 6.4, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2015-06-05T10:59:00.083",
"references": "[{\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-9201\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2015-06-05T10:59:00.083\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.\"},{\"lang\":\"es\",\"value\":\"Beckwith Electric M-6200 Digital Voltage Regulator Control con firmware anterior a D-0198V04.07.00, M-6200A Digital Voltage Regulator Control con firmware anterior a D-0228V02.01.07, M-2001D Digital Tapchanger Control con firmware anterior a D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control con firmware anterior a D-0346V03.00.02, M-6280A Digital Capacitor Bank Control con firmware anterior a D-0254V03.05.05, y M-6280 Digital Capacitor Bank Control no generan correctamente los valores de n\u00fameros de secuencias iniciales (ISN) de TCP, lo que facilita a atacantes remotos falsificar sesiones de TCP mediante la predicci\u00f3n de un valor ISN.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:beckwithelectric:m-2001d_digital_tapchanger_control:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5887C1B7-6F67-40BC-AD30-EDE2A41C927D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:beckwithelectric:m-6200_digital_voltage_regulator_control:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57F30CF8-8FCF-42D9-9B39-D959429ED769\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:beckwithelectric:m-6200a_digital_voltage_regulator_control:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7048ABB-7792-4D1C-9F41-0C43174A718B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:beckwithelectric:m-6280_digital_capacitor_bank_control:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"011AD704-1724-43CC-85EF-7AA1765EDB3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:beckwithelectric:m-6280a_digital_capacitor_bank_control:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DA7C7D-85FB-47E6-9D20-FE4F53EAC4C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286B76C5-6D03-4E70-985B-A1B60E86C6DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:beckwithelectric:m-2001d_digital_tapchanger_control_d-0214_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"01.10.04\",\"matchCriteriaId\":\"1031150D-C53C-4DF8-97C7-E3D41DF4C196\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:beckwithelectric:m-6200_digital_voltage_regulator_control_d-0198_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"04.07.00\",\"matchCriteriaId\":\"A5D190EA-400D-4624-A6EB-D0140DCA9D77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:beckwithelectric:m-6200a_digital_voltage_regulator_control_d-0228_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"02.01.07\",\"matchCriteriaId\":\"EE2F6366-C2DB-44C2-B389-371E34EAF9B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:beckwithelectric:m-6280_digital_capacitor_bank_control_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FB63219-FBE1-4F96-9272-E1A97456B601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:beckwithelectric:m-6280a_digital_capacitor_bank_control_d-0254_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"03.05.05\",\"matchCriteriaId\":\"21CF5B1A-A569-46FA-9CD3-0BFBE3FB61B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control_d-0346_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"03.00.02\",\"matchCriteriaId\":\"DE1B59AD-33D6-4901-B2C4-F6A7498BFA7B\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…