An exploitable vulnerability exists in the verified boot protection of the CUJO Smart Firewall. It is possible to add arbitrary shell commands into the dhcpd.conf file, that persist across reboots and firmware updates, and thus allow for executing unverified commands. To trigger this vulnerability, a local attacker needs to be able to write into /config/dhcpd.conf.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0634 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: talos

Published: 2019-03-21T15:26:08

Updated: 2022-04-19T18:07:12

Reserved: 2018-01-02T00:00:00


Link: CVE-2018-3969

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-03-21T16:29:01.597

Modified: 2023-02-02T13:52:33.107


Link: CVE-2018-3969

JSON object: View

cve-icon Redhat Information

No data.

CWE