Thales nShield Connect hardware models 500, 1500, 6000, 500+, 1500+, and 6000+ before 11.72 allows physically proximate attackers to sign arbitrary data with previously loaded signing keys, extract the device identification key [KNETI] and impersonate the nShield Connect device on a network, affect the integrity and confidentiality of newly created keys, and potentially cause other unspecified impacts using previously loaded keys by connecting to the USB port on the front panel.
References
| Link | Resource |
|---|---|
| http://www.securitytracker.com/id/1032152 | Third Party Advisory VDB Entry |
| http://www.securitytracker.com/id/1032152 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 02:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securitytracker.com/id/1032152 - Third Party Advisory, VDB Entry |
Information
Published : 2017-08-18 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-1878
Mitre link : CVE-2015-1878
CVE.ORG link : CVE-2015-1878
JSON object : View
Products Affected
thalesesecurity
- nshield_connect_1500\+
- nshield_connect_1500
- nshield_connect_500\+
- nshield_connect_6000\+
- nshield_connect_firmware
- nshield_connect_500
- nshield_connect_6000
CWE
CWE-264
Permissions, Privileges, and Access Controls
