Vulnerability Details : CVE-2014-0328
The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
Vulnerability category: Execute code
Products affected by CVE-2014-0328
- cpe:2.3:h:cobham:sailor_6222_vhf:-:*:*:*:*:*:*:*
- cpe:2.3:h:cobham:sailor_6300_mf_\/_hf:-:*:*:*:*:*:*:*
- cpe:2.3:h:cobham:ailor_6110_mini-c_gmdss:-:*:*:*:*:*:*:*
- cpe:2.3:h:cobham:sailor_6006_message_terminal:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-0328
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-0328
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2014-0328
-
http://www.kb.cert.org/vuls/id/179732
VU#179732 - Cobham thraneLINK improper verification of firmware updates vulnerabilityThird Party Advisory;US Government Resource
Jump to