Description
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2732 | There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine. |
References
| Link | Providers |
|---|---|
| https://github.com/aliasrobotics/RVD/issues/2562 |
|
History
No history.
Subscriptions
Easyrobotics
Subscribe
Er-flex
Subscribe
Er-flex Firmware
Subscribe
Er-lite
Subscribe
Er-lite Firmware
Subscribe
Er-one
Subscribe
Er-one Firmware
Subscribe
Er200
Subscribe
Er200 Firmware
Subscribe
Mobile-industrial-robots
Subscribe
Mir100
Subscribe
Mir1000
Subscribe
Mir1000 Firmware
Subscribe
Mir100 Firmware
Subscribe
Mir200
Subscribe
Mir200 Firmware
Subscribe
Mir250
Subscribe
Mir250 Firmware
Subscribe
Mir500
Subscribe
Mir500 Firmware
Subscribe
Uvd-robots
Subscribe
Uvd
Subscribe
Uvd Firmware
Subscribe
Status: PUBLISHED
Assigner: Alias
Published:
Updated: 2024-09-17T02:27:32.380Z
Reserved: 2020-03-10T00:00:00.000Z
Link: CVE-2020-10277
No data.
Status : Modified
Published: 2020-06-24T05:15:13.347
Modified: 2024-11-21T04:55:07.380
Link: CVE-2020-10277
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD