First published: Mon Nov 20 2017(Updated: )
An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Design flaws in OPC classic and in custom netfilter modules allow an attacker to remotely activate rules on the firewall and to connect to any TCP port of a protected asset, thus bypassing the firewall. The attack methodology is a crafted OPC dynamic port shift.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Belden Tofino Xenon Security Appliance Firmware | <=3.1.0 | |
Belden Tofino Xenon Security Appliance Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11402 is an issue discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00, where design flaws in OPC classic and custom netfilter modules allow an attacker to remotely activate rules on the firewall and connect to any TCP port of a protected asset, bypassing the firewall.
The severity of CVE-2017-11402 is critical with a CVSS score of 9.8/10.
The Belden Hirschmann Tofino Xenon Security Appliance firmware versions up to 3.1.0 are affected by CVE-2017-11402.
An attacker can remotely activate firewall rules and connect to any TCP port of a protected asset by exploiting the design flaws in OPC classic and custom netfilter modules.
You can find more information about CVE-2017-11402 in the security advisories on GitHub (https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt) and the Belden Security Bulletin (https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf).