First published: Mon Nov 20 2017(Updated: )
An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Improper handling of the mbap.length field of ModBus packets in the ModBus DPI filter allows an attacker to send malformed/crafted packets to a protected asset, bypassing function code filtering.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belden Tofino Xenon Security Appliance Firmware | <=3.1.0 | |
Belden Tofino Xenon Security Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-11401.
CVE-2017-11401 has a severity rating of 9.8 (critical).
The affected software for CVE-2017-11401 is Belden Tofino Xenon Security Appliance Firmware versions up to and including 3.1.0.
An attacker can exploit CVE-2017-11401 by sending malformed/crafted ModBus packets with improper handling of the mbap.length field to bypass function code filtering.
Yes, you can find more information about CVE-2017-11401 in the following references: [Link 1](https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt) and [Link 2](https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf).