The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/179732 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/179732 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/179732 - Third Party Advisory, US Government Resource |
Information
Published : 2014-08-15 11:15
Updated : 2024-11-21 02:01
NVD link : CVE-2014-0328
Mitre link : CVE-2014-0328
CVE.ORG link : CVE-2014-0328
JSON object : View
Products Affected
cobham
- sailor_6300_mf_\/_hf
- sailor_6222_vhf
- ailor_6110_mini-c_gmdss
- sailor_6006_message_terminal
CWE