Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Dec 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution. | Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution. |
Weaknesses | CWE-354 |
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2023-05-22T19:35:12.357Z
Updated: 2024-12-09T17:33:01.774Z
Reserved: 2023-04-26T19:18:23.295Z
Link: CVE-2023-28386
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-05-22T20:15:10.250
Modified: 2024-12-09T18:15:19.273
Link: CVE-2023-28386
Redhat
No data.