A Buffer Overflow in Network::AuthenticationClient::VerifySignature in /bin/astro in Neato Botvac Connected 2.2.0 allows a remote attacker to execute arbitrary code with root privileges via a crafted POST request to a vendors/neato/robots/[robot_serial]/messages Neato cloud URI on the nucleo.neatocloud.com web site (port 4443).
References
Link | Resource |
---|---|
https://media.ccc.de/v/eh19-157-smart-vacuum-cleaners-as-remote-wiretapping-devices#t=1779 | Exploit Third Party Advisory |
https://www.usenix.org/system/files/woot19-paper_ullrich.pdf | |
https://media.ccc.de/v/eh19-157-smart-vacuum-cleaners-as-remote-wiretapping-devices#t=1779 | Exploit Third Party Advisory |
https://www.usenix.org/system/files/woot19-paper_ullrich.pdf |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://media.ccc.de/v/eh19-157-smart-vacuum-cleaners-as-remote-wiretapping-devices#t=1779 - Exploit, Third Party Advisory | |
References | () https://www.usenix.org/system/files/woot19-paper_ullrich.pdf - |
Information
Published : 2019-04-25 17:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19442
Mitre link : CVE-2018-19442
CVE.ORG link : CVE-2018-19442
JSON object : View
Products Affected
neatorobotics
- botvac_connected_firmware
- botvac_connected
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer