An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. An incomplete firmware signature allows a local attacker to upgrade the equipment (kernel, file system) with unsigned, attacker-controlled, data. This occurs because the appliance_config file is signed but the .tar.sec file is unsigned.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt | Third Party Advisory | 
| https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2017-11-20 15:29
Updated : 2019-10-03 00:03
NVD link : CVE-2017-11400
Mitre link : CVE-2017-11400
CVE.ORG link : CVE-2017-11400
JSON object : View
Products Affected
                belden
- tofino_xenon_security_appliance
 - tofino_xenon_security_appliance_firmware
 
CWE
                
                    
                        
                        CWE-347
                        
            Improper Verification of Cryptographic Signature
