Description
The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-0366 | The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response. |
References
| Link | Providers |
|---|---|
| http://www.kb.cert.org/vuls/id/179732 |
|
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T09:13:10.160Z
Reserved: 2013-12-05T00:00:00.000Z
Link: CVE-2014-0328
No data.
Status : Modified
Published: 2014-08-15T11:15:42.903
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-0328
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD