Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2014-2416 | Sensys Networks VSN240-F and VSN240-T sensors VDS before 2.10.1 and TrafficDOT before 2.10.3 do not use encryption, which allows remote attackers to interfere with traffic control by replaying transmissions on a wireless network. |
Solution
Sensys Networks has produced updated product versions VDS 2.10.1 and TrafficDOT 2.10.3 to remediate vulnerabilities identified in their VSN240-F and VSN240-T traffic sensors. Sensys Networks has released software update VDS 1.8.8, for an older model access point, to remediate traffic sensor vulnerabilities. The updated human-machine interface version, TrafficDOT 2.10.3, enables encrypted software downloads for sensors and sensor data authentication for access points and access point controller cards using updated versions VDS 2.10.1 or VDS 1.8.8. Additional information about Sensys Networks’ software releases can be found at the following location: http://www.sensysnetworks.com/resources-by-category/#sw Updated product versions are available through Sensys Networks’ local distributors. Contact information for their local distributors can be found at the following location: http://www.sensysnetworks.com/distributors/
Workaround
No workaround given by the vendor.
Mon, 13 Oct 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Sensys Networks Traffic Sensor Missing Encryption of Sensitive Data | |
Weaknesses | CWE-311 | |
References |
| |
Metrics |
cvssV2_0
|
cvssV2_0
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-10-13T23:02:57.689Z
Reserved: 2014-03-13T00:00:00
Link: CVE-2014-2379

No data.

Status : Deferred
Published: 2014-09-05T17:55:06.547
Modified: 2025-10-13T23:15:35.540
Link: CVE-2014-2379

No data.

No data.