Unrated severityNVD Advisory· Published Jan 15, 2015· Updated May 6, 2026
CVE-2014-9596
CVE-2014-9596
Description
Panasonic Arbitrator Back-End Server (BES) MK 2.0 VPU before 9.3.1 build 4.08.003.0, when USB Wi-Fi or Direct LAN is enabled, and MK 3.0 VPU before 9.3.1 build 5.06.000.0, when Embedded Wi-Fi or Direct LAN is enabled, does not use encryption, which allows remote attackers to obtain sensitive information by sniffing the network for client-server traffic, as demonstrated by Active Directory credential information.
Affected products
4- cpe:2.3:o:panasonic:arbitrator_back-end_server_mk_3.0_vpu_firmware:*:*:*:*:*:*:*:*Range: <=9.3.1
- cpe:2.3:h:panasonic:arbitrator_back-end_server_mk_3.0_vpu:-:*:*:*:*:*:*:*
- cpe:2.3:o:panasonic:arbitrator_back-end_server_mk_2.0_vpu_firmware:*:*:*:*:*:*:*:*Range: <=9.3.1
- cpe:2.3:h:panasonic:arbitrator_back-end_server_mk_2.0_vpu:-:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- us2.campaign-archive1.comnvdVendor Advisory
- www.kb.cert.org/vuls/id/117604nvdThird Party AdvisoryUS Government Resource
News mentions
0No linked articles in our index yet.