** DISPUTED ** In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack technique.
References
Link | Resource |
---|---|
https://documentation.mersive.com/content/pages/release-notes.htm | Release Notes Vendor Advisory |
https://www.mersive.com/uk/products/solstice/ | Product Vendor Advisory |
https://attack.mitre.org/techniques/T1444/ | Third Party Advisory |
https://github.com/aress31/solstice-pod-cves | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-12-23 08:15
Updated : 2020-12-23 11:58
NVD link : CVE-2020-35587
Mitre link : CVE-2020-35587
JSON object : View
CWE
Products Affected
mersive
- solstice_firmware
- solstice