There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mobile-industrial-robots mir100 firmware |
||
mobile-industrial-robots mir200 firmware - |
||
mobile-industrial-robots mir250 firmware - |
||
mobile-industrial-robots mir500 firmware - |
||
mobile-industrial-robots mir1000 firmware - |
||
easyrobotics er200 firmware - |
||
easyrobotics er-lite firmware - |
||
easyrobotics er-flex firmware - |
||
easyrobotics er-one firmware - |
||
uvd-robots uvd firmware - |