First published: Thu Jun 13 2024(Updated: )
The affected product is vulnerable to an attacker modifying the bootloader by using custom arguments to bypass authentication and gain access to the file system and obtain password hashes.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Motorola Vigilant Fixed Lpr Coms Box Firmware | <=3.1.171.9 | |
Motorola Vigilant Fixed Lpr Coms Box |
Motorola Solutions recommends the following for each identified vulnerability: CVE-2024-38279: * Use secure boot implementation with an edit-resistant GRUB partition. * Additional mitigation consists in limiting the physical access to the device by following the best practices for device mounting. Edit-resistant grub partition has been remediated for all vulnerable systems. Motorola Solutions will release a secure boot implementation in Fall 2024. All customers will receive the update through OTA (over the air) mechanisms. No further actions are required by customers.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38279 is considered high severity due to its potential for unauthorized access and exploitation.
To fix CVE-2024-38279, update the Motorola Vigilant Fixed LPR Coms Box Firmware to a version later than 3.1.171.9.
CVE-2024-38279 allows attackers to modify the bootloader and gain unauthorized access to sensitive data, such as password hashes.
CVE-2024-38279 affects the Motorola Vigilant Fixed LPR Coms Box Firmware versions up to 3.1.171.9.
Yes, CVE-2024-38279 is vulnerable to exploitation that allows attackers to bypass authentication using custom bootloader arguments.