Description
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.
Published: 2014-07-24
Score: 7.8 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

OleumTech has created updates for both BreeZ and the gateway to mitigate all these vulnerabilities. These updates allow users to encrypt their wireless traffic with AES256. To obtain these updates, please log in to the OleumTech download center ( http://support.oleumtech.com/  ) or contact OleumTech tech support:Phone: 866-508-8586 Email: TechSupport@OleumTech.com

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2014-2399 OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.
History

Mon, 06 Oct 2025 17:45:00 +0000

Type Values Removed Values Added
Title OleumTech WIO Use of Cryptographically Weak Pseudo-Random Number Generator
Weaknesses CWE-338
References

Subscriptions

Oleumtech Sensor Wireless I\/o Module Wio Dh2 Wireless Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-10-06T17:33:48.282Z

Reserved: 2014-03-13T00:00:00.000Z

Link: CVE-2014-2362

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-07-24T14:55:07.237

Modified: 2025-10-06T18:15:47.580

Link: CVE-2014-2362

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses