{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T16:59:40.874","vulnerabilities":[{"cve":{"id":"CVE-2014-9193","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2014-12-20T00:59:03.633","lastModified":"2025-07-28T21:15:24.513","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Innominate mGuard with firmware before 7.6.6 and 8.x before 8.1.4 allows remote authenticated admins to obtain root privileges by changing a PPP configuration setting."},{"lang":"es","value":"Innominate mGuard con firmware anterior a 7.6.6 y 8.x anterior a 8.1.4 permite a administradores remotos autenticados obtener privilegios de root al cambiar a una configuración PPP."}],"metrics":{"cvssMetricV2":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:C/I:C/A:C","baseScore":8.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":6.8,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:innominate:mguard_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"7.6.6","matchCriteriaId":"8AEF887D-FBFD-4EC4-BAF4-9BE80EDEAF6D"},{"vulnerable":true,"criteria":"cpe:2.3:o:innominate:mguard_firmware:8.0.0:*:*:*:*:*:*:*","matchCriteriaId":"4A14A9C8-D4E3-45F4-B1F8-F9D93F48506A"},{"vulnerable":true,"criteria":"cpe:2.3:o:innominate:mguard_firmware:8.0.1:*:*:*:*:*:*:*","matchCriteriaId":"5055C2CB-9D8A-4490-90EC-C32C019E756F"},{"vulnerable":true,"criteria":"cpe:2.3:o:innominate:mguard_firmware:8.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1080DE53-1831-4BD4-9084-5ADB6886526C"},{"vulnerable":true,"criteria":"cpe:2.3:o:innominate:mguard_firmware:8.0.3:*:*:*:*:*:*:*","matchCriteriaId":"81F1A071-7FA9-4317-A4E1-D05150587F51"},{"vulnerable":true,"criteria":"cpe:2.3:o:innominate:mguard_firmware:8.1.1:*:*:*:*:*:*:*","matchCriteriaId":"F59B18C5-4164-454E-907D-7B5D0DAC0675"},{"vulnerable":true,"criteria":"cpe:2.3:o:innominate:mguard_firmware:8.1.2:*:*:*:*:*:*:*","matchCriteriaId":"C0B52E63-9C7E-41F9-B268-3EF905F89C27"},{"vulnerable":true,"criteria":"cpe:2.3:o:innominate:mguard_firmware:8.1.3:*:*:*:*:*:*:*","matchCriteriaId":"F42DC442-074D-4223-9FD2-2B010E004255"}]}]}],"references":[{"url":"http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf","source":"ics-cert@hq.dhs.gov","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-14-352-02","source":"ics-cert@hq.dhs.gov"},{"url":"http://www.innominate.com/data/downloads/software/innominate_security_advisory_20141217_001_en.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-14-352-02","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}