4.4
CVSSv2

CVE-2018-20785

Published: 23/02/2019 Updated: 03/10/2019
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.4 | Impact Score: 5.9 | Exploitability Score: 1.4
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

neatorobotics botvac_d4_connected_firmware 2.2.0

neatorobotics botvac_d6_connected_firmware 2.2.0

neatorobotics botvac_d5_connected_firmware 2.2.0

neatorobotics botvac_d7_connected_firmware 2.2.0

neatorobotics botvac_d3_connected_firmware 2.2.0

neatorobotics botvac_d3_pro_connected_firmware 2.2.0

neatorobotics botvac_connected_firmware 2.2.0