CVE-2014-2361

OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.
References
Link Resource
http://ics-cert.us-cert.gov/advisories/ICSA-14-202-01 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/68795
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:oleumtech:sensor_wireless_i\/o_module:-:*:*:*:*:*:*:*
cpe:2.3:h:oleumtech:wio_dh2_wireless_gateway:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-07-24 14:55

Updated : 2024-02-04 18:35


NVD link : CVE-2014-2361

Mitre link : CVE-2014-2361

CVE.ORG link : CVE-2014-2361


JSON object : View

Products Affected

oleumtech

  • sensor_wireless_i\/o_module
  • wio_dh2_wireless_gateway