CVE ID | CVE-2021-31505 |
CVSS SCORE | 6.8, AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
Arlo |
AFFECTED PRODUCTS |
Q Plus |
VULNERABILITY DETAILS |
This vulnerability allows attackers with physical access to escalate privileges on affected installations of Arlo Q Plus. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSH service. The device can be booted into a special operation mode where hard-coded credentials are accepted for SSH authentication. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. |
ADDITIONAL DETAILS |
Arlo has issued an update to correct this vulnerability. More details can be found at:
https://kb.arlo.com/000062592/Security-Advisory-for-Arlo-Q-Plus-SSH-Use-of-Hard-coded-Credentials-Allowing-Privilege-Escalation |
DISCLOSURE TIMELINE |
|
CREDIT | Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | pedrib@gmail.com) + Radek Domanski (@RabbitPro) |