CVE-2017-11402
CRITICALBelden Tofino Xenon Security Applianc... - Improper Input Validation
Title source: ruleDescription
An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Design flaws in OPC classic and in custom netfilter modules allow an attacker to remotely activate rules on the firewall and to connect to any TCP port of a protected asset, thus bypassing the firewall. The attack methodology is a crafted OPC dynamic port shift.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_misc
https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf
Third Party Advisory x_refsource_misc
https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt
Scores
CVSS v3
9.8
EPSS
0.0009
EPSS Percentile
25.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-20
Status
published
Products (1)
belden/tofino_xenon_security_appliance_firmware
< 3.1.0
Published
Nov 20, 2017
Tracked Since
Feb 18, 2026