Vulnerability Note VU#179732
Cobham thraneLINK improper verification of firmware updates vulnerability
CWE-347: Improper Verification of Cryptographic Signature
IOActive reports that Cobham's thraneLINK protocol does not verify cryptographic signatures for firmware updates before installing them. A remote unauthenticated attacker may use the SLPFindSrvs protocol function to discover thraneLINK devices on the network then send a crafted SNMP request to have the device download a firmware update from a TFTP server under the control of the attacker.
A remote unauthenticated attacker may be able to deploy a malicious firmware image to a thraneLINK device and execute arbitrary code.
We are currently unaware of a practical solution to this problem. Please consider the following workaround.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Cobham plc||Affected||14 Jan 2014||05 Aug 2014|
|Cobham plc||Affected||14 Jan 2014||28 Jul 2014|
CVSS Metrics (Learn More)
Thanks to Ruben Santamarta for reporting this vulnerability.
This document was written by Chris King.
- CVE IDs: CVE-2014-0328
- Date Public: 07 Aug 2014
- Date First Published: 07 Aug 2014
- Date Last Updated: 14 Aug 2014
- Document Revision: 25
If you have feedback, comments, or additional information about this vulnerability, please send us email.