An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. An incomplete firmware signature allows a local attacker to upgrade the equipment (kernel, file system) with unsigned, attacker-controlled, data. This occurs because the appliance_config file is signed but the .tar.sec file is unsigned.
References
Link | Resource |
---|---|
https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt | Third Party Advisory |
https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-11-20 15:29
Updated : 2019-10-03 00:03
NVD link : CVE-2017-11400
Mitre link : CVE-2017-11400
CVE.ORG link : CVE-2017-11400
JSON object : View
Products Affected
belden
- tofino_xenon_security_appliance
- tofino_xenon_security_appliance_firmware
CWE
CWE-347
Improper Verification of Cryptographic Signature