Thales nShield Connect hardware models 500, 1500, 6000, 500+, 1500+, and 6000+ before 11.72 allows physically proximate attackers to sign arbitrary data with previously loaded signing keys, extract the device identification key [KNETI] and impersonate the nShield Connect device on a network, affect the integrity and confidentiality of newly created keys, and potentially cause other unspecified impacts using previously loaded keys by connecting to the USB port on the front panel.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securitytracker.com/id/1032152 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1032152 | Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 02:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securitytracker.com/id/1032152 - Third Party Advisory, VDB Entry | 
Information
                Published : 2017-08-18 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-1878
Mitre link : CVE-2015-1878
CVE.ORG link : CVE-2015-1878
JSON object : View
Products Affected
                thalesesecurity
- nshield_connect_6000\+
- nshield_connect_6000
- nshield_connect_1500
- nshield_connect_firmware
- nshield_connect_1500\+
- nshield_connect_500\+
- nshield_connect_500
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
