Description
In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-8243 | In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:37:54.204Z
Reserved: 2020-08-03T00:00:00.000Z
Link: CVE-2020-16282
No data.
Status : Modified
Published: 2020-08-20T16:15:11.613
Modified: 2024-11-21T05:07:05.797
Link: CVE-2020-16282
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD