VAR-201506-0208

Vulnerability from variot - Updated: 2023-12-18 11:42

Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. Beckwith Electric Multiple products TCP Initial sequence number (ISN) Does not properly generate the value of TCP A vulnerability exists that spoofs a session.By a third party ISN By predicting the value, TCP Sessions may be impersonated. Beckwith Electric is a transformer device in the United States. A security bypass vulnerability exists in several Beckwith Electric products. An attacker can exploit this issue to gain access to sensitive information, to cause a denial-of-service condition or session hijacking and perform certain unauthorized actions; this may lead to further attacks

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0208",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "m-6280 digital capacitor bank control",
        "scope": "eq",
        "trust": 3.2,
        "vendor": "beckwithelectric",
        "version": null
      },
      {
        "model": "m-6280 digital capacitor bank control",
        "scope": null,
        "trust": 1.6,
        "vendor": "beckwith electric",
        "version": null
      },
      {
        "model": "m-6280a digital capacitor bank control",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "beckwithelectric",
        "version": null
      },
      {
        "model": "m-2001d digital tapchanger control",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "beckwithelectric",
        "version": null
      },
      {
        "model": "m-6200a digital voltage regulator control",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "beckwithelectric",
        "version": null
      },
      {
        "model": "m-6283a three phase digital capacitor bank control",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "beckwithelectric",
        "version": null
      },
      {
        "model": "m-6200 digital voltage regulator control",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "beckwithelectric",
        "version": null
      },
      {
        "model": "m-2001d digital tapchanger control d-0214",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "beckwithelectric",
        "version": "01.10.04"
      },
      {
        "model": "m-6200 digital voltage regulator control d-0198",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "beckwithelectric",
        "version": "04.07.00"
      },
      {
        "model": "m-6280a digital capacitor bank control d-0254",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "beckwithelectric",
        "version": "03.05.05"
      },
      {
        "model": "m-6283a three phase digital capacitor bank control d-0346",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "beckwithelectric",
        "version": "03.00.02"
      },
      {
        "model": "m-6200a digital voltage regulator control d-0228",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "beckwithelectric",
        "version": "02.01.07"
      },
      {
        "model": "m-2001d digital tapchanger control",
        "scope": null,
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": null
      },
      {
        "model": "m-2001d digital tapchanger control",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": "d-0214v01.10.04"
      },
      {
        "model": "m-6200 digital voltage regulator control",
        "scope": null,
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": null
      },
      {
        "model": "m-6200 digital voltage regulator control",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": "d-0198v04.07.00"
      },
      {
        "model": "m-6200a digital voltage regulator control",
        "scope": null,
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": null
      },
      {
        "model": "m-6200a digital voltage regulator control",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": "d-0228v02.01.07"
      },
      {
        "model": "m-6280a digital capacitor bank control",
        "scope": null,
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": null
      },
      {
        "model": "m-6280a digital capacitor bank control",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": "d-0254v03.05.05"
      },
      {
        "model": "m-6283a three phase digital capacitor bank control",
        "scope": null,
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": null
      },
      {
        "model": "m-6283a three phase digital capacitor bank control",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "beckwith electric",
        "version": "d-0346v03.00.02"
      },
      {
        "model": "electric m-6200 digital voltage regulator contro d\\342\\200\\2200198v04.07.00",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-6200a digital voltage regulator control d\\342\\200\\2200228v02.01.07",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-2001d digital tapchanger control d-0214v01.10.04",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-6283a three phase digital capacitor bank control d-0346v03.00.02",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-6280a digital capacitor bank control d\\342\\200\\2200254v03.05.05",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-6280 digital capacitor bank control",
        "scope": null,
        "trust": 0.6,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "m-6200a digital voltage regulator control d-0228",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "beckwithelectric",
        "version": "02.01.07"
      },
      {
        "model": "m-2001d digital tapchanger control d-0214",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "beckwithelectric",
        "version": "01.10.04"
      },
      {
        "model": "m-6280a digital capacitor bank control d-0254",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "beckwithelectric",
        "version": "03.05.05"
      },
      {
        "model": "m-6283a three phase digital capacitor bank control d-0346",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "beckwithelectric",
        "version": "03.00.02"
      },
      {
        "model": "electric m-6283a three phase digital capacitor bank control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": "0"
      },
      {
        "model": "electric m-6280a digital capacitor bank control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": "0"
      },
      {
        "model": "electric m-6280 digital capacitor bank control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": "0"
      },
      {
        "model": "electric m-6200a digital voltage regulator control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": "0"
      },
      {
        "model": "electric m-6200 digital voltage regulator control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": "0"
      },
      {
        "model": "electric m-2001d digital tapchanger control",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": "0"
      },
      {
        "model": "electric m-6283a three phase digital capacitor bank control d-0346v03.00.02",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-6280a digital capacitor bank control d-0254v03.05.05",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-6200a digital voltage regulator control d-0228v02.01.07",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-6200 digital voltage regulator control d-0198v04.07.00",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": null
      },
      {
        "model": "electric m-2001d digital tapchanger control d-0214v01.10.04",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "beckwith",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "db": "BID",
        "id": "74970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:beckwithelectric:m-6200_digital_voltage_regulator_control:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:beckwithelectric:m-6200_digital_voltage_regulator_control_d-0198_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "04.07.00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:beckwithelectric:m-6200a_digital_voltage_regulator_control:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control_d-0346_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "03.00.02",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:beckwithelectric:m-6280a_digital_capacitor_bank_control:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:beckwithelectric:m-6280a_digital_capacitor_bank_control_d-0254_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "03.05.05",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:beckwithelectric:m-6280_digital_capacitor_bank_control_firmware:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:beckwithelectric:m-2001d_digital_tapchanger_control:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:beckwithelectric:m-6283a_three_phase_digital_capacitor_bank_control:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:beckwithelectric:m-6280_digital_capacitor_bank_control:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:beckwithelectric:m-6200a_digital_voltage_regulator_control_d-0228_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "02.01.07",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:beckwithelectric:m-2001d_digital_tapchanger_control_d-0214_firmware:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "01.10.04",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9201"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Raheem Beyah, David Formby, and San Shin Jung of Georgia Tech.",
    "sources": [
      {
        "db": "BID",
        "id": "74970"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2014-9201",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2014-9201",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2015-03660",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-77146",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-9201",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-03660",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201506-060",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-77146",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77146"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Beckwith Electric M-6200 Digital Voltage Regulator Control with firmware before D-0198V04.07.00, M-6200A Digital Voltage Regulator Control with firmware before D-0228V02.01.07, M-2001D Digital Tapchanger Control with firmware before D-0214V01.10.04, M-6283A Three Phase Digital Capacitor Bank Control with firmware before D-0346V03.00.02, M-6280A Digital Capacitor Bank Control with firmware before D-0254V03.05.05, and M-6280 Digital Capacitor Bank Control do not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value. Beckwith Electric Multiple products TCP Initial sequence number (ISN) Does not properly generate the value of TCP A vulnerability exists that spoofs a session.By a third party ISN By predicting the value, TCP Sessions may be impersonated. Beckwith Electric is a transformer device in the United States. A security bypass vulnerability exists in several Beckwith Electric products. \nAn attacker can exploit this issue to gain access to sensitive information, to cause a denial-of-service condition or session hijacking and perform certain unauthorized actions; this may lead to further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-9201"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "db": "BID",
        "id": "74970"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77146"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ICS CERT",
        "id": "ICSA-15-153-01",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9201",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "74970",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-77146",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77146"
      },
      {
        "db": "BID",
        "id": "74970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ]
  },
  "id": "VAR-201506-0208",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77146"
      }
    ],
    "trust": 1.45
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      }
    ]
  },
  "last_update_date": "2023-12-18T11:42:34.244000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.beckwithelectric.com/"
      },
      {
        "title": "Beckwith Electric TCP incorrectly generates patches for TCP ISN value security bypass vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/59464"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-77146"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9201"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-153-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9201"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9201"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/74970"
      },
      {
        "trust": 0.3,
        "url": "http://www.beckwithelectric.com/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77146"
      },
      {
        "db": "BID",
        "id": "74970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "db": "VULHUB",
        "id": "VHN-77146"
      },
      {
        "db": "BID",
        "id": "74970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-9201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-06-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "date": "2015-06-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77146"
      },
      {
        "date": "2015-06-03T00:00:00",
        "db": "BID",
        "id": "74970"
      },
      {
        "date": "2015-06-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "date": "2015-06-05T10:59:00.083000",
        "db": "NVD",
        "id": "CVE-2014-9201"
      },
      {
        "date": "2015-06-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-06-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-03660"
      },
      {
        "date": "2015-06-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-77146"
      },
      {
        "date": "2015-06-03T00:00:00",
        "db": "BID",
        "id": "74970"
      },
      {
        "date": "2015-06-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      },
      {
        "date": "2015-06-05T17:59:22.703000",
        "db": "NVD",
        "id": "CVE-2014-9201"
      },
      {
        "date": "2015-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Beckwith Electric In multiple products  TCP Session impersonation vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-008070"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201506-060"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…