| |
Vulnerability CVE-2018-3969
Published: 2019-03-21
Description: |
An exploitable vulnerability exists in the verified boot protection of the CUJO Smart Firewall. It is possible to add arbitrary shell commands into the dhcpd.conf file, that persist across reboots and firmware updates, and thus allow for executing unverified commands. To trigger this vulnerability, a local attacker needs to be able to write into /config/dhcpd.conf. |
Type:
CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection'))
CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
7.2/10 |
10/10 |
3.9/10 |
Exploit range |
Attack complexity |
Authentication |
Local |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0634
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|