The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/179732 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-08-15 04:15
Updated : 2014-08-15 09:58
NVD link : CVE-2014-0328
Mitre link : CVE-2014-0328
JSON object : View
CWE
Products Affected
cobham
- sailor_6300_mf_\/_hf
- ailor_6110_mini-c_gmdss
- sailor_6222_vhf
- sailor_6006_message_terminal