Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2014-2415 | Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not verify the integrity of downloaded updates, which allows remote attackers to execute arbitrary code via a Trojan horse update. |
Solution
Sensys Networks has produced updated product versions VDS 2.10.1 and TrafficDOT 2.10.3 to remediate vulnerabilities identified in their VSN240-F and VSN240-T traffic sensors. Sensys Networks has released software update VDS 1.8.8, for an older model access point, to remediate traffic sensor vulnerabilities. The updated human-machine interface version, TrafficDOT 2.10.3, enables encrypted software downloads for sensors and sensor data authentication for access points and access point controller cards using updated versions VDS 2.10.1 or VDS 1.8.8. Additional information about Sensys Networks’ software releases can be found at the following location: http://www.sensysnetworks.com/resources-by-category/#sw Updated product versions are available through Sensys Networks’ local distributors. Contact information for their local distributors can be found at the following location: http://www.sensysnetworks.com/distributors/
Workaround
No workaround given by the vendor.
Mon, 13 Oct 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Sensys Networks Traffic Sensor Download of Code Without Integrity Check | |
Weaknesses | CWE-494 | |
References |
| |
Metrics |
cvssV2_0
|
cvssV2_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-13T23:00:45.632Z
Reserved: 2014-03-13T00:00:00
Link: CVE-2014-2378

No data.

Status : Deferred
Published: 2014-09-05T17:55:06.500
Modified: 2025-10-13T23:15:35.360
Link: CVE-2014-2378

No data.

No data.