Vulnerability CVE-2018-20785


Published: 2019-02-23

Description:
Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials.

Type:

CWE-noinfo

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.4/10
6.4/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Neatorobotics -> Botvac connected firmware 
Neatorobotics -> Botvac d3 connected firmware 
Neatorobotics -> Botvac d3 pro connected firmware 
Neatorobotics -> Botvac d4 connected firmware 
Neatorobotics -> Botvac d5 connected firmware 
Neatorobotics -> Botvac d6 connected firmware 
Neatorobotics -> Botvac d7 connected firmware 

 References:
https://media.ccc.de/v/2018-124-pinky-brain-are-taking-over-the-world-with-vacuum-cleaners#t=745

Copyright 2024, cxsecurity.com

 

Back to Top