VAR-201902-0761
Vulnerability from variot - Updated: 2024-11-23 22:48Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials. Neato Botvac Connected The device contains vulnerabilities related to authorization, authority, and access control.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Neato Robotics Neato Botvac Connected is a cleaning robot from Neato Robotics in the United States. A security vulnerability exists in version 2.2.0 of Neato Robotics Neato Botvac Connected
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0761",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "botvac d3 connected",
"scope": "eq",
"trust": 1.0,
"vendor": "neatorobotics",
"version": "2.2.0"
},
{
"model": "botvac d6 connected",
"scope": "eq",
"trust": 1.0,
"vendor": "neatorobotics",
"version": "2.2.0"
},
{
"model": "botvac d3 pro connected",
"scope": "eq",
"trust": 1.0,
"vendor": "neatorobotics",
"version": "2.2.0"
},
{
"model": "botvac d7 connected",
"scope": "eq",
"trust": 1.0,
"vendor": "neatorobotics",
"version": "2.2.0"
},
{
"model": "botvac d4 connected",
"scope": "eq",
"trust": 1.0,
"vendor": "neatorobotics",
"version": "2.2.0"
},
{
"model": "botvac d5 connected",
"scope": "eq",
"trust": 1.0,
"vendor": "neatorobotics",
"version": "2.2.0"
},
{
"model": "botvac connected",
"scope": "eq",
"trust": 1.0,
"vendor": "neatorobotics",
"version": "2.2.0"
},
{
"model": "botvac connected",
"scope": "eq",
"trust": 0.8,
"vendor": "neato robotics",
"version": "2.2.0"
},
{
"model": "botvac d3 connected",
"scope": "eq",
"trust": 0.8,
"vendor": "neato robotics",
"version": "2.2.0"
},
{
"model": "botvac d3 pro connected",
"scope": "eq",
"trust": 0.8,
"vendor": "neato robotics",
"version": "2.2.0"
},
{
"model": "botvac d4 connected",
"scope": "eq",
"trust": 0.8,
"vendor": "neato robotics",
"version": "2.2.0"
},
{
"model": "botvac d5 connected",
"scope": "eq",
"trust": 0.8,
"vendor": "neato robotics",
"version": "2.2.0"
},
{
"model": "botvac d6 connected",
"scope": "eq",
"trust": 0.8,
"vendor": "neato robotics",
"version": "2.2.0"
},
{
"model": "botvac d7 connected",
"scope": "eq",
"trust": 0.8,
"vendor": "neato robotics",
"version": "2.2.0"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"db": "NVD",
"id": "CVE-2018-20785"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:neato:botvac_connected_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:neato:botvac_d3_connected_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:neato:botvac_d3_pro_connected_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:neato:botvac_d4_connected_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:neato:botvac_d5_connected_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:neato:botvac_d6_connected_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:neato:botvac_d7_connected_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
}
]
},
"cve": "CVE-2018-20785",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "CVE-2018-20785",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "VHN-131626",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.4,
"id": "CVE-2018-20785",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-20785",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2018-20785",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201902-865",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-131626",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-131626"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-865"
},
{
"db": "NVD",
"id": "CVE-2018-20785"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials. Neato Botvac Connected The device contains vulnerabilities related to authorization, authority, and access control.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Neato Robotics Neato Botvac Connected is a cleaning robot from Neato Robotics in the United States. A security vulnerability exists in version 2.2.0 of Neato Robotics Neato Botvac Connected",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-20785"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"db": "VULHUB",
"id": "VHN-131626"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-20785",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014651",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201902-865",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-131626",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-131626"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-865"
},
{
"db": "NVD",
"id": "CVE-2018-20785"
}
]
},
"id": "VAR-201902-0761",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-131626"
}
],
"trust": 0.7318027271428571
},
"last_update_date": "2024-11-23T22:48:29.503000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
"trust": 0.8,
"url": "https://www.neatorobotics.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"db": "NVD",
"id": "CVE-2018-20785"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://media.ccc.de/v/2018-124-pinky-brain-are-taking-over-the-world-with-vacuum-cleaners#t=745"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-20785"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-20785"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-131626"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-865"
},
{
"db": "NVD",
"id": "CVE-2018-20785"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-131626"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-865"
},
{
"db": "NVD",
"id": "CVE-2018-20785"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-02-23T00:00:00",
"db": "VULHUB",
"id": "VHN-131626"
},
{
"date": "2019-04-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"date": "2019-02-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201902-865"
},
{
"date": "2019-02-23T14:29:00.427000",
"db": "NVD",
"id": "CVE-2018-20785"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-131626"
},
{
"date": "2019-04-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-014651"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201902-865"
},
{
"date": "2024-11-21T04:02:10.270000",
"db": "NVD",
"id": "CVE-2018-20785"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201902-865"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Neato Botvac Connected Vulnerabilities related to authorization, authority, and access control in devices",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014651"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201902-865"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.