In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack technique
References
Link | Resource |
---|---|
https://attack.mitre.org/techniques/T1444/ | Third Party Advisory |
https://documentation.mersive.com/content/pages/release-notes.htm | Release Notes Vendor Advisory |
https://github.com/aress31/solstice-pod-cves | Third Party Advisory |
https://www.mersive.com/uk/products/solstice/ | Product Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-12-23T15:19:28
Updated: 2024-06-04T17:12:13.948Z
Reserved: 2020-12-20T00:00:00
Link: CVE-2020-35587
JSON object: View
NVD Information
Status : Modified
Published: 2020-12-23T16:15:12.950
Modified: 2024-06-04T19:17:01.813
Link: CVE-2020-35587
JSON object: View
Redhat Information
No data.
CWE