Description
An exploitable vulnerability exists in the verified boot protection of the CUJO Smart Firewall. It is possible to add arbitrary shell commands into the dhcpd.conf file, that persist across reboots and firmware updates, and thus allow for executing unverified commands. To trigger this vulnerability, a local attacker needs to be able to write into /config/dhcpd.conf.
Published: 2019-03-21
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-15755 An exploitable vulnerability exists in the verified boot protection of the CUJO Smart Firewall. It is possible to add arbitrary shell commands into the dhcpd.conf file, that persist across reboots and firmware updates, and thus allow for executing unverified commands. To trigger this vulnerability, a local attacker needs to be able to write into /config/dhcpd.conf.
History

No history.

Subscriptions

Getcujo Smart Firewall
cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-05T04:57:24.490Z

Reserved: 2018-01-02T00:00:00.000Z

Link: CVE-2018-3969

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-21T16:29:01.597

Modified: 2024-11-21T04:06:24.373

Link: CVE-2018-3969

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses