OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.
References
Link | Resource |
---|---|
http://ics-cert.us-cert.gov/advisories/ICSA-14-202-01 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/68795 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2014-07-24 14:55
Updated : 2024-02-04 18:35
NVD link : CVE-2014-2361
Mitre link : CVE-2014-2361
CVE.ORG link : CVE-2014-2361
JSON object : View
Products Affected
oleumtech
- sensor_wireless_i\/o_module
- wio_dh2_wireless_gateway
CWE