Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-20785

Опубликовано: 23 фев. 2019
Источник: nvd
CVSS3: 7.4
CVSS2: 4.4
EPSS Низкий

Описание

Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:neatorobotics:botvac_d4_connected_firmware:2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:neatorobotics:botvac_d4_connected:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:neatorobotics:botvac_d6_connected_firmware:2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:neatorobotics:botvac_d6_connected:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:neatorobotics:botvac_d5_connected_firmware:2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:neatorobotics:botvac_d5_connected:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:neatorobotics:botvac_d7_connected_firmware:2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:neatorobotics:botvac_d7_connected:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:neatorobotics:botvac_d3_connected_firmware:2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:neatorobotics:botvac_d3_connected:-:*:*:*:*:*:*:*
Конфигурация 6

Одновременно

cpe:2.3:o:neatorobotics:botvac_d3_pro_connected_firmware:2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:neatorobotics:botvac_d3_pro_connected:-:*:*:*:*:*:*:*
Конфигурация 7

Одновременно

cpe:2.3:o:neatorobotics:botvac_connected_firmware:2.2.0:*:*:*:*:*:*:*
cpe:2.3:h:neatorobotics:botvac_connected:-:*:*:*:*:*:*:*

EPSS

Процентиль: 23%
0.00077
Низкий

7.4 High

CVSS3

4.4 Medium

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 7.4
github
больше 3 лет назад

Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials.

EPSS

Процентиль: 23%
0.00077
Низкий

7.4 High

CVSS3

4.4 Medium

CVSS2

Дефекты

NVD-CWE-noinfo