ID

VAR-201711-0698


CVE

CVE-2017-11402


TITLE

Belden Hirschmann Tofino Xenon Security Appliance Vulnerabilities related to security functions

Trust: 0.8

sources: JVNDB: JVNDB-2017-010596

DESCRIPTION

An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Design flaws in OPC classic and in custom netfilter modules allow an attacker to remotely activate rules on the firewall and to connect to any TCP port of a protected asset, thus bypassing the firewall. The attack methodology is a crafted OPC dynamic port shift. Belden Hirschmann Tofino Xenon Security Appliance Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both OPC classic and custom netfilter moudles are functional modules. OPC classic is a process control module. custom netfilter is a custom network filtering module. An attacker could exploit this vulnerability to bypass firewalls

Trust: 1.8

sources: NVD: CVE-2017-11402 // JVNDB: JVNDB-2017-010596 // VULHUB: VHN-101821 // VULMON: CVE-2017-11402

AFFECTED PRODUCTS

vendor:beldenmodel:tofino xenon security appliancescope:lteversion:3.1.0

Trust: 1.0

vendor:beldenmodel:tofino xenonscope:ltversion:03.2.00

Trust: 0.8

vendor:beldenmodel:tofino xenon security appliancescope:eqversion:3.1.0

Trust: 0.6

sources: JVNDB: JVNDB-2017-010596 // CNNVD: CNNVD-201707-665 // NVD: CVE-2017-11402

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-11402
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-11402
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201707-665
value: CRITICAL

Trust: 0.6

VULHUB: VHN-101821
value: HIGH

Trust: 0.1

VULMON: CVE-2017-11402
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-11402
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-101821
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-11402
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-101821 // VULMON: CVE-2017-11402 // JVNDB: JVNDB-2017-010596 // CNNVD: CNNVD-201707-665 // NVD: CVE-2017-11402

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-254

Trust: 0.9

sources: VULHUB: VHN-101821 // JVNDB: JVNDB-2017-010596 // NVD: CVE-2017-11402

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201707-665

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201707-665

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010596

PATCH

title:BSECV-2017-14url:https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf

Trust: 0.8

title:Belden Hirschmann Tofino Xenon Security Appliance OPC classic and custom netfilter Repair measures for module security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99936

Trust: 0.6

sources: JVNDB: JVNDB-2017-010596 // CNNVD: CNNVD-201707-665

EXTERNAL IDS

db:NVDid:CVE-2017-11402

Trust: 2.6

db:JVNDBid:JVNDB-2017-010596

Trust: 0.8

db:CNNVDid:CNNVD-201707-665

Trust: 0.7

db:VULHUBid:VHN-101821

Trust: 0.1

db:VULMONid:CVE-2017-11402

Trust: 0.1

sources: VULHUB: VHN-101821 // VULMON: CVE-2017-11402 // JVNDB: JVNDB-2017-010596 // CNNVD: CNNVD-201707-665 // NVD: CVE-2017-11402

REFERENCES

url:https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt

Trust: 1.8

url:https://www.belden.com/hubfs/support/security/bulletins/belden-security-bulletin-bsecv-2017-14-1v1-1.pdf

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-11402

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-11402

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-101821 // VULMON: CVE-2017-11402 // JVNDB: JVNDB-2017-010596 // CNNVD: CNNVD-201707-665 // NVD: CVE-2017-11402

SOURCES

db:VULHUBid:VHN-101821
db:VULMONid:CVE-2017-11402
db:JVNDBid:JVNDB-2017-010596
db:CNNVDid:CNNVD-201707-665
db:NVDid:CVE-2017-11402

LAST UPDATE DATE

2025-04-20T23:25:54.578000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-101821date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-11402date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-010596date:2017-12-20T00:00:00
db:CNNVDid:CNNVD-201707-665date:2019-10-23T00:00:00
db:NVDid:CVE-2017-11402date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-101821date:2017-11-20T00:00:00
db:VULMONid:CVE-2017-11402date:2017-11-20T00:00:00
db:JVNDBid:JVNDB-2017-010596date:2017-12-20T00:00:00
db:CNNVDid:CNNVD-201707-665date:2017-07-18T00:00:00
db:NVDid:CVE-2017-11402date:2017-11-20T15:29:00.340