CVE-2020-25860

MEDIUM

rauc < 1.5 - Time-of-check Time-of-use Race Condition in install.c

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2020-25860. PoCs published by rauc.

AI-analyzed exploit summary This repository provides integration examples and patches for RAUC 1.5, addressing CVE-2020-25860. It includes instructions for OpenEmbedded/Yocto, PTXdist, and Buildroot, along with patches for OpenSSL and kernel compatibility.

Description

The install.c module in the Pengutronix RAUC update client prior to version 1.5 has a Time-of-Check Time-of-Use vulnerability, where signature verification on an update file takes place before the file is reopened for installation. An attacker who can modify the update file just before it is reopened can install arbitrary code on the device.

Exploits (1)

nomisec WRITEUP 1 stars
by rauc · poc
https://github.com/rauc/rauc-1.5-integration

This repository provides integration examples and patches for RAUC 1.5, addressing CVE-2020-25860. It includes instructions for OpenEmbedded/Yocto, PTXdist, and Buildroot, along with patches for OpenSSL and kernel compatibility.

Classification
Writeup 100%
Attack Type
Other
Complexity
Moderate
Reliability
Theoretical
Target: RAUC 1.5
No auth needed
Prerequisites: Access to the target system for integration · Appropriate build environment (OpenEmbedded/Yocto, PTXdist, or Buildroot)
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (2)

Core 2

Scores

CVSS v3 6.6
EPSS 0.0049
EPSS Percentile 65.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-367
Status published
Products (1)
pengutronix/rauc < 1.5
Published Dec 21, 2020
Tracked Since Feb 18, 2026