Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 16 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 09 Dec 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution. | Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution. |
Weaknesses | CWE-354 |

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:33:35.168Z
Reserved: 2023-04-26T19:18:23.295Z
Link: CVE-2023-28386

Updated: 2024-08-02T12:38:24.902Z

Status : Modified
Published: 2023-05-22T20:15:10.250
Modified: 2024-12-09T18:15:19.273
Link: CVE-2023-28386

No data.