Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials.

Project Subscriptions

Vendors Products
Neatorobotics Subscribe
Botvac Connected Subscribe
Botvac Connected Firmware Subscribe
Botvac D3 Connected Subscribe
Botvac D3 Connected Firmware Subscribe
Botvac D3 Pro Connected Subscribe
Botvac D3 Pro Connected Firmware Subscribe
Botvac D4 Connected Subscribe
Botvac D4 Connected Firmware Subscribe
Botvac D5 Connected Subscribe
Botvac D5 Connected Firmware Subscribe
Botvac D6 Connected Subscribe
Botvac D6 Connected Firmware Subscribe
Botvac D7 Connected Subscribe
Botvac D7 Connected Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2018-13328 Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T12:12:27.379Z

Reserved: 2019-02-23T00:00:00

Link: CVE-2018-20785

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-23T14:29:00.427

Modified: 2024-11-21T04:02:10.270

Link: CVE-2018-20785

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses