#VU92103 Authentication bypass using an alternate path or channel in Vigilant Fixed LPR Coms Box (BCAV1F2-C600)


Published: 2024-06-14

Vulnerability identifier: #VU92103

Vulnerability risk: Low

CVSSv3.1: 4.2 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2024-38279

CWE-ID: CWE-288

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Vigilant Fixed LPR Coms Box (BCAV1F2-C600)
Hardware solutions / Firmware

Vendor: Motorola

Description

The vulnerability allows a local attacker to bypass authentication process.

The vulnerability exists due to the authentication bypass using an alternate path or channel. An attacker with physical access can modify the bootloader by using custom arguments to bypass authentication, gain access to the file system and obtain password hashes.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Vigilant Fixed LPR Coms Box (BCAV1F2-C600): 3.1.171.9


External links
http://www.cisa.gov/news-events/ics-advisories/icsa-24-165-19


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability