Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-9021 Eaton Cooper Power Systems ProView 4.0 and 5.0 before 5.0 11 on Form 6 controls and Idea and IdeaPLUS relays generates TCP initial sequence number (ISN) values linearly, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.
Fixes

Solution

Eaton’s Cooper Power Systems division has developed ProView 5.0 Revision 11 software that mitigates this vulnerability, and the Form 6 control version was released on June 12, 2015. Idea/IdeaPLUS relay ProView software versions began to be posted on June 30, 2015. ProView 5.0 Revision 11 will be compatible with any hardware and firmware Versions 5.0 and higher. Versions below 5.0 may be updated with the appropriate and corresponding hardware upgrades. Information on how to obtain and install these available remedies is available at: http://www.cooperindustries.com/content/public/en/power_systems/resources/securitysupport.html For additional technical information, please contact Eaton’s Cooper Power Systems at: https://www.eaton.com/cybersecurity


Workaround

No authentication mechanism was used for new socket connections to SCADA protocol listening ports on the Form 6 control and Idea/IdeaPLUS relays. The effects of exploiting this vulnerability are the same as the effects of an attacker connecting directly to the control or network and listening for or initiating a new session, without exploiting any vulnerabilities. This underscores the importance of deploying network segmentation and isolation on the control system network. By ensuring that controls are not accessible from external networks and that appropriate physical security measures are provided at network access points, risks associated with this vulnerability are greatly minimized. Eaton’s Cooper Power Systems recommends that asset owners using these products take the proper steps to ensure system wide defense-in-depth strategies, as outlined in Eaton’s whitepaper WP152002EN. This whitepaper can be downloaded at: https://www.eaton.com/content/dam/eaton/products/industrialcontrols-drives-automation-sensors/c441-motor-insight-motor-protection-relays/cyber-security-white-paper-wp152002en.pdf

History

Fri, 05 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Title Eaton’s Cooper Power Series Form 6 Control and Idea/IdeaPlus Relays with Ethernet
Weaknesses CWE-342
References
Metrics cvssV2_0

{'score': 9.3, 'vector': 'AV:N/AC:M/Au:N/C:C/I:C/A:C'}

cvssV2_0

{'score': 7.6, 'vector': 'AV:N/AC:H/Au:N/C:C/I:C/A:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-05T21:11:15.864Z

Reserved: 2014-12-02T00:00:00

Link: CVE-2014-9196

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-07-20T01:59:01.113

Modified: 2025-09-05T21:15:33.743

Link: CVE-2014-9196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.