Improper physical access control and use of hard-coded...
High severity
Unreviewed
Published
Mar 11, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Mar 10, 2022
Published to the GitHub Advisory Database
Mar 11, 2022
Last updated
Jan 27, 2023
Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.
References