OKER UART
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
> [Description] | |
>> OS Command Injection vulnerability in OKER G955V1 v1.03.02.20161128, | |
>> allows physical attackers to interrupt the boot sequence and execute | |
>> arbitrary commands with root privileges. | |
--------------------------------------------------------------- | |
> [Vulnerability Type] | |
>> Incorrect Access Control | |
--------------------------------------------------------------- | |
> [Additional Information] | |
>> Proof of Concept: | |
>> https://www.dropbox.com/s/cnzwbxhxl0ahzoa/OKER_UART_2.mp4 | |
--------------------------------------------------------------- | |
> [Affected Component] | |
>> UART Hardware | |
--------------------------------------------------------------- | |
> [Attack Type] | |
>> Physical | |
--------------------------------------------------------------- | |
> [Impact Code execution] | |
>> true | |
--------------------------------------------------------------- | |
> [Attack Vectors] | |
>> The attacker with physical access is able to access the | |
>> device console with root privilege via UART hardware. Once | |
>> the UART channel (Tx, Rx, GND) is identified, the attacker | |
>> will be able to access the device console, interrupt the | |
>> boot sequence and gain access to the console with root | |
>> privilege lead to information disclosure, arbitrary code | |
>> execution, backdoor planting on the device to conduct | |
>> further attack (e.g. Data infiltration and exfiltration on | |
>> internal network) | |
--------------------------------------------------------------- | |
> [Has vendor confirmed] | |
>> true | |
--------------------------------------------------------------- | |
> [Discoverer] | |
>> Prathan Phongthiproek | |
--------------------------------------------------------------- | |
> [Reference] | |
>> http://www.okerthai.com | |
>> https://www.dropbox.com/s/cnzwbxhxl0ahzoa/OKER_UART_2.mp4 | |
--------------------------------------------------------------- | |
> [Vendor of Product] | |
>> OKER | |
--------------------------------------------------------------- | |
> [Affected Product Code Base] | |
>> G955V1 v1.03.02.20161128 | |
--------------------------------------------------------------- |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment