An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. An incomplete firmware signature allows a local attacker to upgrade the equipment (kernel, file system) with unsigned, attacker-controlled, data. This occurs because the appliance_config file is signed but the .tar.sec file is unsigned.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt - Third Party Advisory | |
References | () https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf - Vendor Advisory |
Information
Published : 2017-11-20 15:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11400
Mitre link : CVE-2017-11400
CVE.ORG link : CVE-2017-11400
JSON object : View
Products Affected
belden
- tofino_xenon_security_appliance_firmware
- tofino_xenon_security_appliance
CWE
CWE-347
Improper Verification of Cryptographic Signature