An exploitable vulnerability exists in the verified boot protection of the CUJO Smart Firewall. It is possible to add arbitrary shell commands into the dhcpd.conf file, that persist across reboots and firmware updates, and thus allow for executing unverified commands. To trigger this vulnerability, a local attacker needs to be able to write into /config/dhcpd.conf.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published: 2019-03-21T15:26:08

Updated: 2024-08-05T04:57:24.490Z

Reserved: 2018-01-02T00:00:00

Link: CVE-2018-3969

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2019-03-21T16:29:01.597

Modified: 2023-02-02T13:52:33.107

Link: CVE-2018-3969

cve-icon Redhat

No data.