The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://www.kb.cert.org/vuls/id/179732 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: certcc
Published: 2014-08-15T10:00:00
Updated: 2024-08-06T09:13:10.160Z
Reserved: 2013-12-05T00:00:00
Link: CVE-2014-0328
Vulnrichment
No data.
NVD
Status : Modified
Published: 2014-08-15T11:15:42.903
Modified: 2024-11-21T02:01:53.397
Link: CVE-2014-0328
Redhat
No data.