The administration console of the Moog EXO Series EXVF5C-2 and EXVP7C2-3 units features a 'statusbroadcast' command that can spawn a given process repeatedly at a certain time interval as 'root'. One of the limitations of this feature is that it only takes a path to a binary without arguments; however, this can be circumvented using special shell variables, such as '${IFS}'. As a result, an attacker can execute arbitrary commands as 'root' on the units.
References
Link | Resource |
---|---|
https://ioactive.com/moog-exo-series-multiple-vulnerabilities/ | Third Party Advisory |
https://ioac.tv/3hy1xu6 | Exploit Third Party Advisory |
Information
Published : 2020-08-21 08:15
Updated : 2020-08-27 07:23
NVD link : CVE-2020-24054
Mitre link : CVE-2020-24054
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
moog
- exvf5c-2_firmware
- exvp7c2-3
- exvp7c2-3_firmware
- exvf5c-2