Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-9596


Panasonic Arbitrator Back-End Server (BES) MK 2.0 VPU before 9.3.1 build 4.08.003.0, when USB Wi-Fi or Direct LAN is enabled, and MK 3.0 VPU before 9.3.1 build 5.06.000.0, when Embedded Wi-Fi or Direct LAN is enabled, does not use encryption, which allows remote attackers to obtain sensitive information by sniffing the network for client-server traffic, as demonstrated by Active Directory credential information.


Published

2015-01-15T23:59:00.053

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-310

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System panasonic arbitrator_back-end_server_mk_3.0_vpu_firmware ≤ 9.3.1 Yes
Hardware panasonic arbitrator_back-end_server_mk_3.0_vpu - Yes
Operating System panasonic arbitrator_back-end_server_mk_2.0_vpu_firmware ≤ 9.3.1 Yes
Hardware panasonic arbitrator_back-end_server_mk_2.0_vpu - Yes

References