Lucene search

K
cve[email protected]CVE-2021-30066
HistoryApr 03, 2022 - 11:15 p.m.

CVE-2021-30066

2022-04-0323:15:07
CWE-347
web.nvd.nist.gov
27
cve-2021-30066
schneider electric
connexium tofino firewall
tcsefea23f3f22
firmware signature verification
belden tofino xenon security appliance

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.2%

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an arbitrary firmware image can be loaded because firmware signature verification (for a USB stick) can be bypassed. NOTE: this issue exists because of an incomplete fix of CVE-2017-11400.

Affected configurations

NVD
Node
beldentofino_xenon_security_appliance_firmwareRange<03.2.03
AND
beldentofino_xenon_security_applianceMatch-
Node
beldentofino_argon_fa-tsa-220-tx\/mm_firmwareMatch-
AND
beldentofino_argon_fa-tsa-220-tx\/mmMatch-
Node
beldentofino_argon_fa-tsa-220-tx\/tx_firmwareMatch-
AND
beldentofino_argon_fa-tsa-220-tx\/txMatch-
Node
beldentofino_argon_fa-tsa-220-mm\/tx_firmwareMatch-
AND
beldentofino_argon_fa-tsa-220-mm\/txMatch-
Node
beldentofino_argon_fa-tsa-220-mm\/mm_firmwareMatch-
AND
beldentofino_argon_fa-tsa-220-mm\/mmMatch-
Node
beldentofino_argon_fa-tsa-100-tx\/tx_firmwareMatch-
AND
beldentofino_argon_fa-tsa-100-tx\/txMatch-
Node
beldeneagle_20_tofino_943_987-505-mm\/mm_firmwareMatch-
AND
beldeneagle_20_tofino_943_987-505-mm\/mmMatch-
Node
beldeneagle_20_tofino_943_987-504-mm\/tx_firmwareMatch-
AND
beldeneagle_20_tofino_943_987-504-mm\/txMatch-
Node
beldeneagle_20_tofino_943_987-502_-tx\/mm_firmwareMatch-
AND
beldeneagle_20_tofino_943_987-502_-tx\/mmMatch-
Node
beldeneagle_20_tofino_943_987-501-tx\/tx_firmwareMatch-
AND
beldeneagle_20_tofino_943_987-501-tx\/txMatch-
Node
schneider-electrictcsefea23f3f20_firmwareMatch-
AND
schneider-electrictcsefea23f3f20Match-
Node
schneider-electrictcsefea23f3f21_firmwareMatch-
AND
schneider-electrictcsefea23f3f21Match-
Node
schneider-electrictcsefea23f3f22_firmwareRange<03.23
AND
schneider-electrictcsefea23f3f22Match-

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.8 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.2%

Related for CVE-2021-30066