Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Dec 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution. | Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution. |
| Weaknesses | CWE-354 |
Status: PUBLISHED
Assigner: icscert
Published: 2023-05-22T19:35:12.357Z
Updated: 2025-01-16T21:33:35.168Z
Reserved: 2023-04-26T19:18:23.295Z
Link: CVE-2023-28386
Updated: 2024-08-02T12:38:24.902Z
Status : Modified
Published: 2023-05-22T20:15:10.250
Modified: 2024-12-09T18:15:19.273
Link: CVE-2023-28386
No data.
ReportizFlow