An issue was discovered on the ENTTEC Datagate MK2, Storm 24, Pixelator, and E-Streamer MK2 with firmware 70044_update_05032019-482. They replace secure and protected directory permissions (set as default by the underlying operating system) with highly insecure read, write, and execute directory permissions for all users. By default, /usr/local and all of its subdirectories should have permissions set to only allow non-privileged users to read and execute from the tree structure, and to deny users from creating or editing files in this location. The ENTTEC firmware startup script permits all users to read, write, and execute (rwxrwxrwx) from the /usr, /usr/local, /usr/local/dmxis, and /usr/local/bin/ directories.
References
Link | Resource |
---|---|
https://www.mogozobo.com/?p=3476 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2019-06-07 16:29
Updated : 2024-02-28 17:08
NVD link : CVE-2019-12777
Mitre link : CVE-2019-12777
CVE.ORG link : CVE-2019-12777
JSON object : View
Products Affected
enttec
- datagate_mk2_firmware
- e-streamer_mk2
- pixelator_firmware
- e-streamer_mk2_firmware
- storm_24
- storm_24_firmware
- datagate_mk2
- pixelator
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource