The thraneLINK protocol implementation on Cobham devices does not verify firmware signatures, which allows attackers to execute arbitrary code by leveraging physical access or terminal access to send an SNMP request and a TFTP response.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://www.kb.cert.org/vuls/id/179732 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T09:13:10.160Z
Reserved: 2013-12-05T00:00:00
Link: CVE-2014-0328

No data.

Status : Deferred
Published: 2014-08-15T11:15:42.903
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-0328

No data.