The affected product is vulnerable to an attacker modifying the bootloader by using custom arguments to bypass authentication and gain access to the file system and obtain password hashes.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-19 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
03 Oct 2024, 17:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
CPE | cpe:2.3:h:motorola:vigilant_fixed_lpr_coms_box:-:*:*:*:*:*:*:* cpe:2.3:o:motorola:vigilant_fixed_lpr_coms_box_firmware:*:*:*:*:*:*:*:* |
|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-19 - Third Party Advisory, US Government Resource | |
First Time |
Motorola vigilant Fixed Lpr Coms Box Firmware
Motorola Motorola vigilant Fixed Lpr Coms Box |
|
CWE | CWE-306 | |
Summary |
|
13 Jun 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-13 17:15
Updated : 2024-10-03 17:32
NVD link : CVE-2024-38279
Mitre link : CVE-2024-38279
CVE.ORG link : CVE-2024-38279
JSON object : View
Products Affected
motorola
- vigilant_fixed_lpr_coms_box_firmware
- vigilant_fixed_lpr_coms_box