First published: Mon Nov 20 2017(Updated: )
An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. An incomplete firmware signature allows a local attacker to upgrade the equipment (kernel, file system) with unsigned, attacker-controlled, data. This occurs because the appliance_config file is signed but the .tar.sec file is unsigned.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belden Tofino Xenon Security Appliance Firmware | <=3.1.0 | |
Belden Tofino Xenon Security Appliance Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-11400 is high.
CVE-2017-11400 affects Belden Tofino Xenon Security Appliance Firmware version up to 3.1.0.
A local attacker can exploit CVE-2017-11400 by upgrading the equipment (kernel, file system) with unsigned, attacker-controlled data.
The CWE of CVE-2017-11400 is CWE-347.
You can find more information about CVE-2017-11400 in the following references: [GitHub Advisory](https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt) and [Belden Security Bulletin](https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf).