Description
The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
Published: 2014-08-15
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2014-0366 The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
References
History

No history.

Subscriptions

Cobham Ailor 6110 Mini-c Gmdss Sailor 6006 Message Terminal Sailor 6222 Vhf Sailor 6300 Mf \/ Hf
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T09:13:10.160Z

Reserved: 2013-12-05T00:00:00.000Z

Link: CVE-2014-0328

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-08-15T11:15:42.903

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-0328

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses