Overview
Cobham's thraneLINK protocol does not verify cryptographic signatures for firmware updates before installing them. This may allow an attacker to deploy a malicious firmware update to the device.
Description
CWE-347: Improper Verification of Cryptographic Signature IOActive reports that Cobham's thraneLINK protocol does not verify cryptographic signatures for firmware updates before installing them. A remote unauthenticated attacker may use the SLPFindSrvs protocol function to discover thraneLINK devices on the network then send a crafted SNMP request to have the device download a firmware update from a TFTP server under the control of the attacker. |
Impact
A remote unauthenticated attacker may be able to deploy a malicious firmware image to a thraneLINK device and execute arbitrary code. |
Solution
We are currently unaware of a practical solution to this problem. Please consider the following workaround. |
Restrict Access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 6.8 | E:U/RL:W/RC:UC |
Environmental | 5.1 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Ruben Santamarta for reporting this vulnerability.
This document was written by Chris King.
Other Information
CVE IDs: | CVE-2014-0328 |
Date Public: | 2014-08-07 |
Date First Published: | 2014-08-07 |
Date Last Updated: | 2014-08-14 04:50 UTC |
Document Revision: | 25 |