Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Neatorobotics
Subscribe
|
Botvac Connected
Subscribe
Botvac Connected Firmware
Subscribe
Botvac D3 Connected
Subscribe
Botvac D3 Connected Firmware
Subscribe
Botvac D3 Pro Connected
Subscribe
Botvac D3 Pro Connected Firmware
Subscribe
Botvac D4 Connected
Subscribe
Botvac D4 Connected Firmware
Subscribe
Botvac D5 Connected
Subscribe
Botvac D5 Connected Firmware
Subscribe
Botvac D6 Connected
Subscribe
Botvac D6 Connected Firmware
Subscribe
Botvac D7 Connected
Subscribe
Botvac D7 Connected Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-13328 | Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:12:27.379Z
Reserved: 2019-02-23T00:00:00
Link: CVE-2018-20785
No data.
Status : Modified
Published: 2019-02-23T14:29:00.427
Modified: 2024-11-21T04:02:10.270
Link: CVE-2018-20785
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD