In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-8243 | In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:37:54.204Z
Reserved: 2020-08-03T00:00:00.000Z
Link: CVE-2020-16282
No data.
Status : Modified
Published: 2020-08-20T16:15:11.613
Modified: 2024-11-21T05:07:05.797
Link: CVE-2020-16282
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD