First published: Wed Dec 23 2015(Updated: )
Eaton Cooper Power Systems ProView 4.x and 5.x before 5.1 on Form 6 controls and Idea and IdeaPLUS relays does not properly initialize padding fields in Ethernet packets, which allows remote attackers to obtain sensitive information by reading packet data.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Proview | =4.0 | |
Eaton Proview | =5.0 | |
Eaton Proview | =5.0.1 | |
Eaton Proview | =5.0.2 | |
Eaton Proview | =5.0.3 | |
Eaton Proview | =5.0.4 | |
Eaton Proview | =5.0.5 | |
Eaton Proview | =5.0.6 | |
Eaton Proview | =5.0.7 | |
Eaton Proview | =5.0.8 | |
Eaton Proview | =5.0.9 | |
Eaton Proview | =5.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6471 is classified as a medium severity vulnerability due to the potential for sensitive data exposure.
To fix CVE-2015-6471, upgrade Eaton ProView to version 5.1 or later.
Eaton ProView versions 4.x and 5.x prior to 5.1 are affected by CVE-2015-6471.
CVE-2015-6471 allows remote attackers to obtain sensitive information by reading uninitialized padding fields in Ethernet packet data.
Yes, CVE-2015-6471 is considered a remote vulnerability as it can be exploited over a network.